Windows Exploit Suggester was updated to Python 3 https://github.com/a1ext/Windows-Exploit-Suggester #security #windows #dukeBarman
GitHub
GitHub - a1ext/Windows-Exploit-Suggester: This tool compares a targets patch levels against the Microsoft vulnerability database…
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public expl...
Ghidra Scripts/Plugins/Extension
https://github.com/AllsafeCyberSecurity/awesome-ghidra
#reverse #ghidra #plugin #extension #script #darw1n
https://github.com/AllsafeCyberSecurity/awesome-ghidra
#reverse #ghidra #plugin #extension #script #darw1n
GitHub
GitHub - AllsafeCyberSecurity/awesome-ghidra: A curated list of awesome Ghidra materials
A curated list of awesome Ghidra materials. Contribute to AllsafeCyberSecurity/awesome-ghidra development by creating an account on GitHub.
The new OpenSecurityTraining2 site has been launched at http://ost2.fyi The public betas of refreshed classes on x86-64 assembly, x86-64 OS internals and coreboot are now open #security #hardware #reverse #dukeBarman
We don't know what happened. But it looks like the Chinese friends are celebrating some kind of holiday again. Maybe some of them have a birthday today?
https://twitter.com/R0_CREW/status/1422084760713715714
RT plz 🙈
https://twitter.com/R0_CREW/status/1422084760713715714
RT plz 🙈
Twitter
R0 CREW
[LEAKED] IDA Pro 7.6 SP1 + HexRays (x86/x64/ARM/ARM64/MIPS) Some guy "gogogo" came to our telegram (t.me/r0_chat) chat and leaked IDA Pro 7.6 SP1. forum.reverse4you.org/t/leaked-ida-p… #idapro #ida #leaked #decompilers
YauzaCTF 2021 is a task-based competition that will take place online on August 27-29 at 12:00 (UTC+0).
It will give the participants the atmosphere of the Soviet past.
For 48 hours, participants will be able to solve tasks of all categories:
- web, reverse, pwn, forensics, crypto, OSINT, joy.
Also new categories have been added:
- hardware, pentest and emulation!
The organizers and sponsors of the event have prepared many interesting prizes. More details on the event website.
ABOUT EVENT:
🕹 Event website: https://yauzactf.com/en
📃 CTFtime page: https://ctftime.org/event/1417/
🔑 Competition type: task-based competition
📅 Start: on August 27 at 12:00 (UTC+0)
⏰ Duration: 48 hours
👨👨👦👦 Number of people in the team: maximum 7 people
🥇 Qualification: students from CIS schools or universities (graduating not earlier than 2021) and those, who born not earlier than 1995
CONTACTS
☎️ For any questions talk to @drakylar
#ctf #YauzaCTF
It will give the participants the atmosphere of the Soviet past.
For 48 hours, participants will be able to solve tasks of all categories:
- web, reverse, pwn, forensics, crypto, OSINT, joy.
Also new categories have been added:
- hardware, pentest and emulation!
The organizers and sponsors of the event have prepared many interesting prizes. More details on the event website.
ABOUT EVENT:
🕹 Event website: https://yauzactf.com/en
📃 CTFtime page: https://ctftime.org/event/1417/
🔑 Competition type: task-based competition
📅 Start: on August 27 at 12:00 (UTC+0)
⏰ Duration: 48 hours
👨👨👦👦 Number of people in the team: maximum 7 people
🥇 Qualification: students from CIS schools or universities (graduating not earlier than 2021) and those, who born not earlier than 1995
CONTACTS
☎️ For any questions talk to @drakylar
#ctf #YauzaCTF
Introducing Lumen Server Protocol
https://abda.nl/posts/introducing-lumen/
A private Lumina server for IDA Pro
https://github.com/naim94a/lumen
Investigating IDA Lumina Feature
https://www.synacktiv.com/en/publications/investigating-ida-lumina-feature.html
Local server for IDA Lumina feature
https://github.com/synacktiv/lumina_server
#reverse #tools #lumina #server #protocol #rpc #poc #darw1n
https://abda.nl/posts/introducing-lumen/
A private Lumina server for IDA Pro
https://github.com/naim94a/lumen
Investigating IDA Lumina Feature
https://www.synacktiv.com/en/publications/investigating-ida-lumina-feature.html
Local server for IDA Lumina feature
https://github.com/synacktiv/lumina_server
#reverse #tools #lumina #server #protocol #rpc #poc #darw1n
abda.nl
Introducing Lumen
Lumen - A private Lumina server for IDA Pro
Windows Kernel Explorer (you can simply call it as "WKE") is a free but powerful kernel research tool. It supports from Windows XP to Windows 10 (32-bit and 64-bit). Compared with WIN64AST and PCHunter, WKE can run on the latest Windows 10 without updating binary files.
https://github.com/AxtMueller/Windows-Kernel-Explorer
#tools #kernel #windows #antirootkit #darw1n
https://github.com/AxtMueller/Windows-Kernel-Explorer
#tools #kernel #windows #antirootkit #darw1n
GitHub
GitHub - AxtMueller/Windows-Kernel-Explorer: A free but powerful Windows kernel research tool.
A free but powerful Windows kernel research tool. Contribute to AxtMueller/Windows-Kernel-Explorer development by creating an account on GitHub.
Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode https://github.com/pietroborrello/ghidra-atom-microcode #reverse #ghidra #dukeBarman
GitHub
GitHub - pietroborrello/ghidra-atom-microcode: Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode
Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode - pietroborrello/ghidra-atom-microcode
@VolgaCTF 2021 is an international inter-university cybersecurity competition with a local conference taking place in Samara, Russia on September 13-17.
Schedule of Presentations:
https://volgactf.ru/en/volgactf-2021/final/
Registration Form (free for everyone):
https://forms.yandex.ru/u/612dc0bd893f1f629d79d1e4/
#VolgaCTF #Conference #CTF
Schedule of Presentations:
https://volgactf.ru/en/volgactf-2021/final/
Registration Form (free for everyone):
https://forms.yandex.ru/u/612dc0bd893f1f629d79d1e4/
#VolgaCTF #Conference #CTF
iOS Wi-Fi Demon: From iOS Format String to Zero-Click RCE
https://ictexpertsluxembourg.lu/technical-corner/ios-wi-fi-demon-from-ios-format-string-to-zero-click-rce/
#reverse #expdev #mobile #ios #rce #formatstring #darw1n
https://ictexpertsluxembourg.lu/technical-corner/ios-wi-fi-demon-from-ios-format-string-to-zero-click-rce/
#reverse #expdev #mobile #ios #rce #formatstring #darw1n
DEEP
DEEP – Votre partenaire pour une transformation digitale réussie
Avec son expertise en Cloud, Cybersécurité, Data et Télécom, DEEP aide les organisations à innover de manière responsable et à créer de la valeur à l’ère numérique.
Powerful automated tool for reverse engineering Unity IL2CPP binaries
https://github.com/djkaty/Il2CppInspector
#reverse #unity #tools #il2cpp #ida #ghidra #x64dbg #ilspy #dnspy #inject #hook #obfuscation #darw1n
https://github.com/djkaty/Il2CppInspector
#reverse #unity #tools #il2cpp #ida #ghidra #x64dbg #ilspy #dnspy #inject #hook #obfuscation #darw1n
GitHub
GitHub - djkaty/Il2CppInspector: Powerful automated tool for reverse engineering Unity IL2CPP binaries
Powerful automated tool for reverse engineering Unity IL2CPP binaries - djkaty/Il2CppInspector
iOS Tweak Development
Part1: https://cwcaude.github.io/project/tutorial/2020/07/02/iOS-tweak-dev-1.html
Part2: https://cwcaude.github.io/project/tutorial/2020/07/04/iOS-tweak-dev-2.html
Part3: https://cwcaude.github.io/project/tutorial/2020/07/12/iOS-tweak-dev-3.html
Part4: https://cwcaude.github.io/project/tutorial/2020/07/16/iOS-tweak-dev-4.html
#dev #mobile #ios #tweak #darw1n
Part1: https://cwcaude.github.io/project/tutorial/2020/07/02/iOS-tweak-dev-1.html
Part2: https://cwcaude.github.io/project/tutorial/2020/07/04/iOS-tweak-dev-2.html
Part3: https://cwcaude.github.io/project/tutorial/2020/07/12/iOS-tweak-dev-3.html
Part4: https://cwcaude.github.io/project/tutorial/2020/07/16/iOS-tweak-dev-4.html
#dev #mobile #ios #tweak #darw1n
Android ADB plugin for Total Commander:
Original: https://4pda.to/forum/index.php?showtopic=374826
Mirror: https://totalcmd.net/plugring/android_adb.html
#tools #mobile #android #adb #darw1n
Original: https://4pda.to/forum/index.php?showtopic=374826
Mirror: https://totalcmd.net/plugring/android_adb.html
#tools #mobile #android #adb #darw1n
4pda.to
Android ADB - 4PDA
Android ADB, плагин для Total Commander
Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store
https://github.com/majd/ipatool
#tweak #tool #mobile #ios #ipa #darw1n
https://github.com/majd/ipatool
#tweak #tool #mobile #ios #ipa #darw1n
GitHub
GitHub - majd/ipatool: Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App…
Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store - majd/ipatool
Nim implementation of Process Hollowing using syscalls (for educational purposes)
https://github.com/snovvcrash/NimHollow
#malware #redteam #processhollowing #inject #darw1n
https://github.com/snovvcrash/NimHollow
#malware #redteam #processhollowing #inject #darw1n
GitHub finds 7 code execution vulnerabilities in 'tar' and npm CLI
https://github.blog/2021-09-08-github-security-update-vulnerabilities-tar-npmcli-arborist/
#expdev #tar #cli #darw1n
https://github.blog/2021-09-08-github-security-update-vulnerabilities-tar-npmcli-arborist/
#expdev #tar #cli #darw1n
The GitHub Blog
GitHub security update: Vulnerabilities in tar and @npmcli/arborist
Between July 21 and August 13 we received reports through one of our private security bug bounty programs from researchers regarding vulnerabilities in tar and @npmcli/arborist.
👍1