We don't know what happened. But it looks like the Chinese friends are celebrating some kind of holiday again. Maybe some of them have a birthday today?
https://twitter.com/R0_CREW/status/1422084760713715714
RT plz 🙈
https://twitter.com/R0_CREW/status/1422084760713715714
RT plz 🙈
Twitter
R0 CREW
[LEAKED] IDA Pro 7.6 SP1 + HexRays (x86/x64/ARM/ARM64/MIPS) Some guy "gogogo" came to our telegram (t.me/r0_chat) chat and leaked IDA Pro 7.6 SP1. forum.reverse4you.org/t/leaked-ida-p… #idapro #ida #leaked #decompilers
YauzaCTF 2021 is a task-based competition that will take place online on August 27-29 at 12:00 (UTC+0).
It will give the participants the atmosphere of the Soviet past.
For 48 hours, participants will be able to solve tasks of all categories:
- web, reverse, pwn, forensics, crypto, OSINT, joy.
Also new categories have been added:
- hardware, pentest and emulation!
The organizers and sponsors of the event have prepared many interesting prizes. More details on the event website.
ABOUT EVENT:
🕹 Event website: https://yauzactf.com/en
📃 CTFtime page: https://ctftime.org/event/1417/
🔑 Competition type: task-based competition
📅 Start: on August 27 at 12:00 (UTC+0)
⏰ Duration: 48 hours
👨👨👦👦 Number of people in the team: maximum 7 people
🥇 Qualification: students from CIS schools or universities (graduating not earlier than 2021) and those, who born not earlier than 1995
CONTACTS
☎️ For any questions talk to @drakylar
#ctf #YauzaCTF
It will give the participants the atmosphere of the Soviet past.
For 48 hours, participants will be able to solve tasks of all categories:
- web, reverse, pwn, forensics, crypto, OSINT, joy.
Also new categories have been added:
- hardware, pentest and emulation!
The organizers and sponsors of the event have prepared many interesting prizes. More details on the event website.
ABOUT EVENT:
🕹 Event website: https://yauzactf.com/en
📃 CTFtime page: https://ctftime.org/event/1417/
🔑 Competition type: task-based competition
📅 Start: on August 27 at 12:00 (UTC+0)
⏰ Duration: 48 hours
👨👨👦👦 Number of people in the team: maximum 7 people
🥇 Qualification: students from CIS schools or universities (graduating not earlier than 2021) and those, who born not earlier than 1995
CONTACTS
☎️ For any questions talk to @drakylar
#ctf #YauzaCTF
Introducing Lumen Server Protocol
https://abda.nl/posts/introducing-lumen/
A private Lumina server for IDA Pro
https://github.com/naim94a/lumen
Investigating IDA Lumina Feature
https://www.synacktiv.com/en/publications/investigating-ida-lumina-feature.html
Local server for IDA Lumina feature
https://github.com/synacktiv/lumina_server
#reverse #tools #lumina #server #protocol #rpc #poc #darw1n
https://abda.nl/posts/introducing-lumen/
A private Lumina server for IDA Pro
https://github.com/naim94a/lumen
Investigating IDA Lumina Feature
https://www.synacktiv.com/en/publications/investigating-ida-lumina-feature.html
Local server for IDA Lumina feature
https://github.com/synacktiv/lumina_server
#reverse #tools #lumina #server #protocol #rpc #poc #darw1n
abda.nl
Introducing Lumen
Lumen - A private Lumina server for IDA Pro
Windows Kernel Explorer (you can simply call it as "WKE") is a free but powerful kernel research tool. It supports from Windows XP to Windows 10 (32-bit and 64-bit). Compared with WIN64AST and PCHunter, WKE can run on the latest Windows 10 without updating binary files.
https://github.com/AxtMueller/Windows-Kernel-Explorer
#tools #kernel #windows #antirootkit #darw1n
https://github.com/AxtMueller/Windows-Kernel-Explorer
#tools #kernel #windows #antirootkit #darw1n
GitHub
GitHub - AxtMueller/Windows-Kernel-Explorer: A free but powerful Windows kernel research tool.
A free but powerful Windows kernel research tool. Contribute to AxtMueller/Windows-Kernel-Explorer development by creating an account on GitHub.
Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode https://github.com/pietroborrello/ghidra-atom-microcode #reverse #ghidra #dukeBarman
GitHub
GitHub - pietroborrello/ghidra-atom-microcode: Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode
Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode - pietroborrello/ghidra-atom-microcode
@VolgaCTF 2021 is an international inter-university cybersecurity competition with a local conference taking place in Samara, Russia on September 13-17.
Schedule of Presentations:
https://volgactf.ru/en/volgactf-2021/final/
Registration Form (free for everyone):
https://forms.yandex.ru/u/612dc0bd893f1f629d79d1e4/
#VolgaCTF #Conference #CTF
Schedule of Presentations:
https://volgactf.ru/en/volgactf-2021/final/
Registration Form (free for everyone):
https://forms.yandex.ru/u/612dc0bd893f1f629d79d1e4/
#VolgaCTF #Conference #CTF
iOS Wi-Fi Demon: From iOS Format String to Zero-Click RCE
https://ictexpertsluxembourg.lu/technical-corner/ios-wi-fi-demon-from-ios-format-string-to-zero-click-rce/
#reverse #expdev #mobile #ios #rce #formatstring #darw1n
https://ictexpertsluxembourg.lu/technical-corner/ios-wi-fi-demon-from-ios-format-string-to-zero-click-rce/
#reverse #expdev #mobile #ios #rce #formatstring #darw1n
DEEP
DEEP – Votre partenaire pour une transformation digitale réussie
Avec son expertise en Cloud, Cybersécurité, Data et Télécom, DEEP aide les organisations à innover de manière responsable et à créer de la valeur à l’ère numérique.
Powerful automated tool for reverse engineering Unity IL2CPP binaries
https://github.com/djkaty/Il2CppInspector
#reverse #unity #tools #il2cpp #ida #ghidra #x64dbg #ilspy #dnspy #inject #hook #obfuscation #darw1n
https://github.com/djkaty/Il2CppInspector
#reverse #unity #tools #il2cpp #ida #ghidra #x64dbg #ilspy #dnspy #inject #hook #obfuscation #darw1n
GitHub
GitHub - djkaty/Il2CppInspector: Powerful automated tool for reverse engineering Unity IL2CPP binaries
Powerful automated tool for reverse engineering Unity IL2CPP binaries - djkaty/Il2CppInspector
iOS Tweak Development
Part1: https://cwcaude.github.io/project/tutorial/2020/07/02/iOS-tweak-dev-1.html
Part2: https://cwcaude.github.io/project/tutorial/2020/07/04/iOS-tweak-dev-2.html
Part3: https://cwcaude.github.io/project/tutorial/2020/07/12/iOS-tweak-dev-3.html
Part4: https://cwcaude.github.io/project/tutorial/2020/07/16/iOS-tweak-dev-4.html
#dev #mobile #ios #tweak #darw1n
Part1: https://cwcaude.github.io/project/tutorial/2020/07/02/iOS-tweak-dev-1.html
Part2: https://cwcaude.github.io/project/tutorial/2020/07/04/iOS-tweak-dev-2.html
Part3: https://cwcaude.github.io/project/tutorial/2020/07/12/iOS-tweak-dev-3.html
Part4: https://cwcaude.github.io/project/tutorial/2020/07/16/iOS-tweak-dev-4.html
#dev #mobile #ios #tweak #darw1n
Android ADB plugin for Total Commander:
Original: https://4pda.to/forum/index.php?showtopic=374826
Mirror: https://totalcmd.net/plugring/android_adb.html
#tools #mobile #android #adb #darw1n
Original: https://4pda.to/forum/index.php?showtopic=374826
Mirror: https://totalcmd.net/plugring/android_adb.html
#tools #mobile #android #adb #darw1n
4pda.to
Android ADB - 4PDA
Android ADB, плагин для Total Commander
Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store
https://github.com/majd/ipatool
#tweak #tool #mobile #ios #ipa #darw1n
https://github.com/majd/ipatool
#tweak #tool #mobile #ios #ipa #darw1n
GitHub
GitHub - majd/ipatool: Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App…
Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store - majd/ipatool
Nim implementation of Process Hollowing using syscalls (for educational purposes)
https://github.com/snovvcrash/NimHollow
#malware #redteam #processhollowing #inject #darw1n
https://github.com/snovvcrash/NimHollow
#malware #redteam #processhollowing #inject #darw1n
GitHub finds 7 code execution vulnerabilities in 'tar' and npm CLI
https://github.blog/2021-09-08-github-security-update-vulnerabilities-tar-npmcli-arborist/
#expdev #tar #cli #darw1n
https://github.blog/2021-09-08-github-security-update-vulnerabilities-tar-npmcli-arborist/
#expdev #tar #cli #darw1n
The GitHub Blog
GitHub security update: Vulnerabilities in tar and @npmcli/arborist
Between July 21 and August 13 we received reports through one of our private security bug bounty programs from researchers regarding vulnerabilities in tar and @npmcli/arborist.
👍1
This page was designed to be a useful, informational asset for those looking to understand the specific tactics, techniques, and procedures (TTPs) attackers are leveraging to compromise active directory and guidance to mitigation, detection, and prevention. And understand Active Directory Kill Chain Attack and Modern Post Exploitation Adversary Tradecraft Activity.
https://github.com/infosecn1nja/AD-Attack-Defense
#redteam #activedirectory #darw1n
https://github.com/infosecn1nja/AD-Attack-Defense
#redteam #activedirectory #darw1n
GitHub
GitHub - infosecn1nja/AD-Attack-Defense: Attack and defend active directory using modern post exploitation adversary tradecraft…
Attack and defend active directory using modern post exploitation adversary tradecraft activity - infosecn1nja/AD-Attack-Defense
👍1
Tickling VMProtect with LLVM https://forum.reverse4you.org/t/tickling-vmprotect-with-llvm/16980 #reverse #vmprotect #llmv #tutorial #darw1n
R0 CREW
Tickling VMProtect with LLVM
This series of posts delves into a collection of experiments I (fvrmatteo) did in the past while playing around with LLVM and VMProtect. I recently decided to dust off the code, organize it a bit better and attempt to share some knowledge in such a way that…
Anubis Android Malware Analysis / Source Code https://forum.reverse4you.org/t/anubis-android-malware-analysis/16982 #reverse #mobile #malware #anroid #anubis #analysis #darw1n
R0 CREW
Anubis Android Malware / Source Code / Leaked
Anubis is one of the most well-known malware in the Android Malware family. It’s still popular for threat actors today, given its capabilities and the damage it has done to andorid users in the past. On the other hand, it offers many Malware Developers the…
JavaScript Deobfuscator and Unpacker https://forum.reverse4you.org/t/javascript-deobfuscator-and-unpacker/16986 #tools #malware #javascript #unpack #obfuscation #darw1n
R0 CREW
JavaScript Deobfuscator and Unpacker
Online: https://lelinhtinh.github.io/de4js/ Github: GitHub - lelinhtinh/de4js: JavaScript Deobfuscator and Unpacker