r0 Crew (Channel)
8.83K subscribers
35 photos
1 video
9 files
1.98K links
Security Related Links:
- Reverse Engineering;
- Malware Research;
- Exploit Development;
- Pentest;
- etc;

Join to chat: @r0crew_bot πŸ‘ˆ

Forum: https://forum.reverse4you.org
Twitter: https://twitter.com/R0_Crew
Download Telegram
Flowers and chocolate cannot do what the words of love can. πŸ’πŸ°

Every woman in our lives is unique and beautiful. 😍

The power of they have inside is enormous. πŸŒŽπŸ’‹

They are stronger than anyone can imagine. πŸ’ͺπŸš€

And we all know that this world would mean nothing without a woman. πŸ‘©β€β€οΈβ€πŸ‘¨πŸ‘¨β€πŸ‘©β€πŸ‘§β€πŸ‘¦

So, on this special day we have an amazing opportunity to thank all of them! πŸ₯°

Thank you for making life possible, thank you for being so different and strong! πŸŽ‚β˜•οΈπŸ‘¨β€πŸ³

πŸ₯³ Happy Women’s Day! ✨πŸ’₯
CVE-2021-27365: Linux kernel LPE Exploit. Now with symbols for the latest RHEL8 kernel. Get it while it's still an 0day!

Github: https://github.com/grimm-co/NotQuite0DayFriday/tree/trunk/2021.03.12-linux-iscsi

The following report discloses three distinct vulnerabilities discovered by GRIMM while researching the Linux kernel. The first vulnerability is a heap buffer overflow, the second is a kernel pointer leak, and the third is an out-of-bounds kernel memory read. All three vulnerabilities are associated with the iSCSI subsystem.

Article: https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html?m=1

#reverse #lpe #heap #bof #expdev #linux #darw1n
fpicker: Fuzzing with Frida

https://insinuator.net/2021/03/fpicker-fuzzing-with-frida/

Fpicker is a Frida-based coverage-guided, mostly in-process, blackbox fuzzing suite. Its most significant feature is the AFL++ proxy mode which enables blackbox in-process fuzzing with AFL++ on platforms supported by Frida.

https://github.com/ttdennis/fpicker

#reverse #afl #frida #darw1n
In-the-Wild Series: October 2020 0-day discovery
https://googleprojectzero.blogspot.com/2021/03/in-wild-series-october-2020-0-day.html

In October 2020, Google Project Zero discovered seven 0-day exploits being actively used in-the-wild. These exploits were delivered via "watering hole" attacks in a handful of websites pointing to two exploit servers that hosted exploit chains for Android, Windows, and iOS devices. These attacks appear to be the next iteration of the campaign discovered in February 2020 and documented in below blog posts:

Part1: Introducing the In-the-Wild Series
https://googleprojectzero.blogspot.com/2021/01/introducing-in-wild-series.html

Part2: Chrome Infinity Bug
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-infinity-bug.html

Part3: Chrome Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-exploits.html

Part4: Android Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-exploits.html

Part5: Android Post-Exploitation
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-post-exploitation.html

Part6: Windows Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-windows-exploits.html

#reverse #expdev #rce #lpe #sandbox #escape #android #ios #windows #chrome #browser #darw1n