TIMEP: Test Interface for Multiple Embedded Protocols https://systemoverlord.com/2020/05/08/announcing-timep-test-interface-for-multiple-embedded-protocols.html #debugger #hardware #dukeBarman
System Overlord
Announcing TIMEP: Test Interface for Multiple Embedded Protocols
Today Iβm releasing a new open source hardware (OSHW) project β the Test Interface for Multiple Embedded Protocols (TIMEP). Itβs based around the FTDI FT2232H chip and logic level shifters to provide breakouts, buffering, and level conversion for a numberβ¦
An Xdbg (x64dbg) Plugin of the ERC Library (mona.py alternative?) https://github.com/Andy53/ERC.Xdbg
Another good plugins: https://github.com/x64dbg/x64dbg/wiki/Plugins
#debugger #exploitation #dukeBarman
Another good plugins: https://github.com/x64dbg/x64dbg/wiki/Plugins
#debugger #exploitation #dukeBarman
GitHub
GitHub - Andy53/ERC.Xdbg: An Xdbg Plugin of the ERC Library.
An Xdbg Plugin of the ERC Library. Contribute to Andy53/ERC.Xdbg development by creating an account on GitHub.
Kernel Debugging macOS with SIP https://www.offensive-security.com/offsec/kernel-debugging-macos-with-sip #debugger #macos #dukeBarman
Noninvasive debugging plugin for X64Dbg https://github.com/Vicshann/GhostDbg #debugger #x64dbg #dukeBarman
GitHub
GitHub - Vicshann/GhostDbg: Noninvasive debugging plugin for X64Dbg
Noninvasive debugging plugin for X64Dbg. Contribute to Vicshann/GhostDbg development by creating an account on GitHub.
idados debugger plugin (DOSBOX+IDA) https://github.com/lab313ru/idados_dosbox #reverse #ida #debugger #dukeBarman
GitHub
GitHub - lab313ru/idados_dosbox: idados debugger plugin (DOSBOX+IDA)
idados debugger plugin (DOSBOX+IDA). Contribute to lab313ru/idados_dosbox development by creating an account on GitHub.
Python winappdbg RE Video Tutorial Series https://www.youtube.com/playlist?list=PLKwUZp9HwWoDCm0qqSyXtZqfmbFahmDfn #video #reverse #debugger #dukeBarman
WinDbg Basics for Malware Analysis https://www.youtube.com/watch?v=QuFJpH3My7A #reverse #malware #windbg #debugger #dukeBarman
YouTube
WinDbg Basics for Malware Analysis
In this tutorial we cover the basics of debugging malware with WinDbg. Expand for more...
-----
OALABS DISCORD
https://discord.gg/6h5Bh5AMDU
OALABS PATREON
https://www.patreon.com/oalabs
OALABS TIP JAR
https://ko-fi.com/oalabs
OALABS GITHUB
https://gβ¦
-----
OALABS DISCORD
https://discord.gg/6h5Bh5AMDU
OALABS PATREON
https://www.patreon.com/oalabs
OALABS TIP JAR
https://ko-fi.com/oalabs
OALABS GITHUB
https://gβ¦
Similar implementation of .gdbinit from fG! for lldb in python https://github.com/deroko/lldbinit #reverse #debugger #macos #ios #dukeBarman
GitHub
GitHub - deroko/lldbinit
Contribute to deroko/lldbinit development by creating an account on GitHub.
β€1
VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor. The VMM driver implements multiple breakpoint control managers which allow a user mode client to set, clear, and inspect the logs of VMM-backed breakpoints. These breakpoints are invisible to the guest.
https://github.com/changeofpace/VivienneVMM
#reverse #hypervisor #debugger #darw1n
https://github.com/changeofpace/VivienneVMM
#reverse #hypervisor #debugger #darw1n
GitHub
GitHub - changeofpace/VivienneVMM: VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor.
VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor. - changeofpace/VivienneVMM
Time Travel Debugging - JavaScript Automation https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/time-travel-debugging-javascript-automation #reverse #debugger #windbg #dukeBarman
Docs
Time Travel Debugging - JavaScript Automation - Windows drivers
This section describes how to use JavaScript automation to work with TTD traces.
Step-through debugging with no debugger on Cortex-M https://interrupt.memfault.com/blog/cortex-m-debug-monitor #hardware #debugger #dukeBarman
Interrupt
Step-through debugging with no debugger on Cortex-M
An exploration of how to debug running devices by taking advantage of debug monitor mode on ARM Cortex-M MCUs
gdb v10.1 was released!
Details: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=blob_plain;f=gdb/NEWS;hb=gdb-10.1-release
Download: ftp://ftp.gnu.org/gnu/gdb
#reverse #debugger #dukeBarman
Details: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=blob_plain;f=gdb/NEWS;hb=gdb-10.1-release
Download: ftp://ftp.gnu.org/gnu/gdb
#reverse #debugger #dukeBarman
Updates to XNU debugging tutorial https://www.hex-rays.com/blog/updates-to-xnu-debugging-tutorial/ #debugger #ida #ios #macos #dukeBarman
Hyper-V debugging for beginners. 2nd edition. https://hvinternals.blogspot.com/2021/01/hyper-v-debugging-for-beginners-2nd.html #debugger #reverse #hypervisor #dukeBarman
Blogspot
Hyper-V debugging for beginners. 2nd edition.
hyper-v internals
Now you can give to a hacky debugger Voltron another chance. New maintainer zcutlip promises updates and ask to feedback in issues and PR https://github.com/snare/voltron #reverse #debugger #gdb #lldb #dukeBarman
GitHub
GitHub - snare/voltron: A hacky debugger UI for hackers
A hacky debugger UI for hackers. Contribute to snare/voltron development by creating an account on GitHub.
x64dbg plugin for simple spoofing of CPUID instruction behavior
https://github.com/jonatan1024/CpuidSpoofer
#reverse #tools #plugin #x64 #debugger #hwid #darw1n
https://github.com/jonatan1024/CpuidSpoofer
#reverse #tools #plugin #x64 #debugger #hwid #darw1n
GitHub
GitHub - jonatan1024/CpuidSpoofer: x64dbg plugin for simple spoofing of CPUID instruction behavior
x64dbg plugin for simple spoofing of CPUID instruction behavior - jonatan1024/CpuidSpoofer
Ghidra 10.0 is out! There is debugger support now which is great, that will definitely bridge a usability gap.
https://github.com/NationalSecurityAgency/ghidra/releases/tag/Ghidra_10.0_build
#reverse #ghidra #debugger #darw1n
https://github.com/NationalSecurityAgency/ghidra/releases/tag/Ghidra_10.0_build
#reverse #ghidra #debugger #darw1n
GitHub
Release Ghidra 10.0 Β· NationalSecurityAgency/ghidra
WARNING: Contains log4j vulnerability
What's New
Change History
SHA-256: aaf84d14fb059beda10de9056e013186601962b6f87cd31161aaac57698a0f11
What's New
Change History
SHA-256: aaf84d14fb059beda10de9056e013186601962b6f87cd31161aaac57698a0f11