M1RACLES: An Apple M1 Vulnerability is a covert channel vulnerability in the Apple Silicon “M1” chip ( it isn't real vuln ). https://m1racles.com/ #exploitation #macOS #hardware #fun
M1Racles
M1RACLES: An Apple M1 Vulnerability
M1RACLES (CVE-2021-30747) is a covert channel vulnerability in the Apple Silicon “M1” chip.
Creating a Ghidra processor module in SLEIGH using V8 bytecode as an example
https://swarm.ptsecurity.com/creating-a-ghidra-processor-module-in-sleigh-using-v8-bytecode-as-an-example/
#reverse #ghidra #decompiler #nodejs #v8 #plugin #darw1n
https://swarm.ptsecurity.com/creating-a-ghidra-processor-module-in-sleigh-using-v8-bytecode-as-an-example/
#reverse #ghidra #decompiler #nodejs #v8 #plugin #darw1n
PT SWARM
Creating a Ghidra processor module in SLEIGH using V8 bytecode as an example
Last year our team had to analyze V8 bytecode. Back then, there were no tools in place to decompile such code and facilitate convenient navigation over it. We decided to try writing a processor module for the Ghidra framework. Thanks to the features of the…
Guide to P-code Injection: Changing the intermediate representation of code on the fly in Ghidra
https://swarm.ptsecurity.com/guide-to-p-code-injection/
#reverse #ghidra #decompiler #pcode #nodejs #v8 #plugin #darw1n
https://swarm.ptsecurity.com/guide-to-p-code-injection/
#reverse #ghidra #decompiler #pcode #nodejs #v8 #plugin #darw1n
PT SWARM
Guide to P-code Injection: Changing the intermediate representation of code on the fly in Ghidra
When we were developing the ghidra nodejs module for Ghidra, we realized that it was not always possible to correctly implement V8 (JavaScript engine that is used by Node.js) opcodes in SLEIGH. In such runtime environments as V8 and JVM, a single opcode might…
tiny_tracer 1.6.1 was released. It's a Pin Tool for tracing API calls, etc. https://github.com/hasherezade/tiny_tracer/releases/tag/1.6.1 #reverse #dukeBarman
GitHub
Release 1.6.1 · hasherezade/tiny_tracer
📖 README.md
REFACT
Refactored to build with the latest Pin: 3.19
Requires Intel Pin 3.19 or above.
I am sorry but Intel does not allow for distribution of compiled Pin Tools. So, you need to com...
REFACT
Refactored to build with the latest Pin: 3.19
Requires Intel Pin 3.19 or above.
I am sorry but Intel does not allow for distribution of compiled Pin Tools. So, you need to com...
Ghidra 10.0 is out! There is debugger support now which is great, that will definitely bridge a usability gap.
https://github.com/NationalSecurityAgency/ghidra/releases/tag/Ghidra_10.0_build
#reverse #ghidra #debugger #darw1n
https://github.com/NationalSecurityAgency/ghidra/releases/tag/Ghidra_10.0_build
#reverse #ghidra #debugger #darw1n
GitHub
Release Ghidra 10.0 · NationalSecurityAgency/ghidra
WARNING: Contains log4j vulnerability
What's New
Change History
SHA-256: aaf84d14fb059beda10de9056e013186601962b6f87cd31161aaac57698a0f11
What's New
Change History
SHA-256: aaf84d14fb059beda10de9056e013186601962b6f87cd31161aaac57698a0f11
Cutter 2.0 - Introduction of new features (Reverse Debugging...) https://www.youtube.com/watch?v=wXfbnzcYIlU #reverse #rizin #Cutter #dukeBarman
YouTube
Cutter 2.0 - Introduction of new features (Reverse Debugging...)
This video is about new Release of awesome tool Cutter (2.0), which is a free and open-source reverse engineering platform powered by rizin.
It is a first release of Cutter that is using Rizin as its core backend.
Example features covered in this video:…
It is a first release of Cutter that is using Rizin as its core backend.
Example features covered in this video:…
Windows Exploit Suggester was updated to Python 3 https://github.com/a1ext/Windows-Exploit-Suggester #security #windows #dukeBarman
GitHub
GitHub - a1ext/Windows-Exploit-Suggester: This tool compares a targets patch levels against the Microsoft vulnerability database…
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public expl...
Ghidra Scripts/Plugins/Extension
https://github.com/AllsafeCyberSecurity/awesome-ghidra
#reverse #ghidra #plugin #extension #script #darw1n
https://github.com/AllsafeCyberSecurity/awesome-ghidra
#reverse #ghidra #plugin #extension #script #darw1n
GitHub
GitHub - AllsafeCyberSecurity/awesome-ghidra: A curated list of awesome Ghidra materials
A curated list of awesome Ghidra materials. Contribute to AllsafeCyberSecurity/awesome-ghidra development by creating an account on GitHub.
The new OpenSecurityTraining2 site has been launched at http://ost2.fyi The public betas of refreshed classes on x86-64 assembly, x86-64 OS internals and coreboot are now open #security #hardware #reverse #dukeBarman
We don't know what happened. But it looks like the Chinese friends are celebrating some kind of holiday again. Maybe some of them have a birthday today?
https://twitter.com/R0_CREW/status/1422084760713715714
RT plz 🙈
https://twitter.com/R0_CREW/status/1422084760713715714
RT plz 🙈
Twitter
R0 CREW
[LEAKED] IDA Pro 7.6 SP1 + HexRays (x86/x64/ARM/ARM64/MIPS) Some guy "gogogo" came to our telegram (t.me/r0_chat) chat and leaked IDA Pro 7.6 SP1. forum.reverse4you.org/t/leaked-ida-p… #idapro #ida #leaked #decompilers
YauzaCTF 2021 is a task-based competition that will take place online on August 27-29 at 12:00 (UTC+0).
It will give the participants the atmosphere of the Soviet past.
For 48 hours, participants will be able to solve tasks of all categories:
- web, reverse, pwn, forensics, crypto, OSINT, joy.
Also new categories have been added:
- hardware, pentest and emulation!
The organizers and sponsors of the event have prepared many interesting prizes. More details on the event website.
ABOUT EVENT:
🕹 Event website: https://yauzactf.com/en
📃 CTFtime page: https://ctftime.org/event/1417/
🔑 Competition type: task-based competition
📅 Start: on August 27 at 12:00 (UTC+0)
⏰ Duration: 48 hours
👨👨👦👦 Number of people in the team: maximum 7 people
🥇 Qualification: students from CIS schools or universities (graduating not earlier than 2021) and those, who born not earlier than 1995
CONTACTS
☎️ For any questions talk to @drakylar
#ctf #YauzaCTF
It will give the participants the atmosphere of the Soviet past.
For 48 hours, participants will be able to solve tasks of all categories:
- web, reverse, pwn, forensics, crypto, OSINT, joy.
Also new categories have been added:
- hardware, pentest and emulation!
The organizers and sponsors of the event have prepared many interesting prizes. More details on the event website.
ABOUT EVENT:
🕹 Event website: https://yauzactf.com/en
📃 CTFtime page: https://ctftime.org/event/1417/
🔑 Competition type: task-based competition
📅 Start: on August 27 at 12:00 (UTC+0)
⏰ Duration: 48 hours
👨👨👦👦 Number of people in the team: maximum 7 people
🥇 Qualification: students from CIS schools or universities (graduating not earlier than 2021) and those, who born not earlier than 1995
CONTACTS
☎️ For any questions talk to @drakylar
#ctf #YauzaCTF
Introducing Lumen Server Protocol
https://abda.nl/posts/introducing-lumen/
A private Lumina server for IDA Pro
https://github.com/naim94a/lumen
Investigating IDA Lumina Feature
https://www.synacktiv.com/en/publications/investigating-ida-lumina-feature.html
Local server for IDA Lumina feature
https://github.com/synacktiv/lumina_server
#reverse #tools #lumina #server #protocol #rpc #poc #darw1n
https://abda.nl/posts/introducing-lumen/
A private Lumina server for IDA Pro
https://github.com/naim94a/lumen
Investigating IDA Lumina Feature
https://www.synacktiv.com/en/publications/investigating-ida-lumina-feature.html
Local server for IDA Lumina feature
https://github.com/synacktiv/lumina_server
#reverse #tools #lumina #server #protocol #rpc #poc #darw1n
abda.nl
Introducing Lumen
Lumen - A private Lumina server for IDA Pro
Windows Kernel Explorer (you can simply call it as "WKE") is a free but powerful kernel research tool. It supports from Windows XP to Windows 10 (32-bit and 64-bit). Compared with WIN64AST and PCHunter, WKE can run on the latest Windows 10 without updating binary files.
https://github.com/AxtMueller/Windows-Kernel-Explorer
#tools #kernel #windows #antirootkit #darw1n
https://github.com/AxtMueller/Windows-Kernel-Explorer
#tools #kernel #windows #antirootkit #darw1n
GitHub
GitHub - AxtMueller/Windows-Kernel-Explorer: A free but powerful Windows kernel research tool.
A free but powerful Windows kernel research tool. Contribute to AxtMueller/Windows-Kernel-Explorer development by creating an account on GitHub.
Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode https://github.com/pietroborrello/ghidra-atom-microcode #reverse #ghidra #dukeBarman
GitHub
GitHub - pietroborrello/ghidra-atom-microcode: Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode
Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode - pietroborrello/ghidra-atom-microcode
@VolgaCTF 2021 is an international inter-university cybersecurity competition with a local conference taking place in Samara, Russia on September 13-17.
Schedule of Presentations:
https://volgactf.ru/en/volgactf-2021/final/
Registration Form (free for everyone):
https://forms.yandex.ru/u/612dc0bd893f1f629d79d1e4/
#VolgaCTF #Conference #CTF
Schedule of Presentations:
https://volgactf.ru/en/volgactf-2021/final/
Registration Form (free for everyone):
https://forms.yandex.ru/u/612dc0bd893f1f629d79d1e4/
#VolgaCTF #Conference #CTF
iOS Wi-Fi Demon: From iOS Format String to Zero-Click RCE
https://ictexpertsluxembourg.lu/technical-corner/ios-wi-fi-demon-from-ios-format-string-to-zero-click-rce/
#reverse #expdev #mobile #ios #rce #formatstring #darw1n
https://ictexpertsluxembourg.lu/technical-corner/ios-wi-fi-demon-from-ios-format-string-to-zero-click-rce/
#reverse #expdev #mobile #ios #rce #formatstring #darw1n
DEEP
DEEP – Votre partenaire pour une transformation digitale réussie
Avec son expertise en Cloud, Cybersécurité, Data et Télécom, DEEP aide les organisations à innover de manière responsable et à créer de la valeur à l’ère numérique.
Powerful automated tool for reverse engineering Unity IL2CPP binaries
https://github.com/djkaty/Il2CppInspector
#reverse #unity #tools #il2cpp #ida #ghidra #x64dbg #ilspy #dnspy #inject #hook #obfuscation #darw1n
https://github.com/djkaty/Il2CppInspector
#reverse #unity #tools #il2cpp #ida #ghidra #x64dbg #ilspy #dnspy #inject #hook #obfuscation #darw1n
GitHub
GitHub - djkaty/Il2CppInspector: Powerful automated tool for reverse engineering Unity IL2CPP binaries
Powerful automated tool for reverse engineering Unity IL2CPP binaries - djkaty/Il2CppInspector