Binary Ninja 3.0 The Next Chapter (Pseudo C decompile!) https://binary.ninja/2022/01/27/3.0-the-next-chapter.html #reverse #binaryninja #dukeBarman
Binary Ninja
Binary Ninja - 3.0 The Next Chapter
Binary Ninja is a modern reverse engineering platform with a scriptable and extensible decompiler.
π10π4π3β€2
An experimental dynamic approach to devirtualize pure functions protected by VMProtect 3.x
https://github.com/JonathanSalwan/VMProtect-devirtualization
#reverse #vmp #vmprotect #protection #obfuscation #deobfuscation #devirtualization #sloukixnx
https://github.com/JonathanSalwan/VMProtect-devirtualization
#reverse #vmp #vmprotect #protection #obfuscation #deobfuscation #devirtualization #sloukixnx
GitHub
GitHub - JonathanSalwan/VMProtect-devirtualization: Playing with the VMProtect software protection. Automatic deobfuscation ofβ¦
Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM. - JonathanSalwan/VMProtect-devirtualization
π18π₯6β€4
A Comprehensive Guide to Hooking Windows APIs with Python
https://forum.reverse4you.org/t/a-comprehensive-guide-to-hooking-windows-apis-with-python/18152
#reverse #malware #inject #hook #tips #darw1n
https://forum.reverse4you.org/t/a-comprehensive-guide-to-hooking-windows-apis-with-python/18152
#reverse #malware #inject #hook #tips #darw1n
R0 CREW
A Comprehensive Guide to Hooking Windows APIs with Python
Developers apply API hooking practices to better understand how a system works, alter the behavior of an operating system or an application, detect malicious code, and build strong products. The majority of guides and tutorials on Windows API hooking areβ¦
π12π₯11
The FLARE Obfuscated String Solver (FLOSS) has been supporting analysts to extract hidden strings from malware samples for many years now. Over the last few months, weβve added new functionality and improved the toolβs performance. In this blog post we will share exciting new features and improvements including a new string deobfuscation technique, simplified tool usage, and much faster result output.
https://www.mandiant.com/resources/floss-version-2
#malware #reverse #tools #SoGood0x1
https://www.mandiant.com/resources/floss-version-2
#malware #reverse #tools #SoGood0x1
Google Cloud Blog
FLOSS Version 2.0 | Mandiant | Google Cloud Blog
β€10π8
Rizin v0.4.0 and Cutter v2.1.0 are here! π₯³
Rizin team:
We continue our focus on stability and performance while introducing new features, including:
- FLIRT signatures applied automatically during the analysis!
- New Intermediate Language β RzIL
https://github.com/rizinorg/rizin/releases/tag/v0.4.0
Cutter team:
Introducing exciting new features including auto-detection of common library functions, a YARA plugin to quickly create and test signatures, and many more...
https://github.com/rizinorg/cutter/releases/tag/v2.1.0
#reverse #rizin #cutter
Rizin team:
We continue our focus on stability and performance while introducing new features, including:
- FLIRT signatures applied automatically during the analysis!
- New Intermediate Language β RzIL
https://github.com/rizinorg/rizin/releases/tag/v0.4.0
Cutter team:
Introducing exciting new features including auto-detection of common library functions, a YARA plugin to quickly create and test signatures, and many more...
https://github.com/rizinorg/cutter/releases/tag/v2.1.0
#reverse #rizin #cutter
GitHub
Release Release v0.4.0 Β· rizinorg/rizin
Here we are again with a new release of Rizin, v0.4.0. We are still in the v0.y.z realm, but we are getting closer and closer to what we can consider our first stable release v1.0.0, with fully wor...
β€9π6π₯5
At the beginning of 2020, we discovered the Red Unlock technique that allows extracting Intel Atom Microcode. We were able to research the internal structure of the microcode and then x86 instruction implementation. Also, we recovered a format of microcode updates, algorithm and the encryption key used to protect the microcode
https://github.com/chip-red-pill/MicrocodeDecryptor
#tools #reverse #intel #interlnals #microcode #Aligner
https://github.com/chip-red-pill/MicrocodeDecryptor
#tools #reverse #intel #interlnals #microcode #Aligner
π₯22β€5π4π1
UserComment is a plugin to display user-added comments in disassembly and pseudocode views.
https://forum.reverse4you.org/t/usercomment-an-ida-plugin-to-show-user-added-comments/19747
#reverse #idapro #plugin
https://forum.reverse4you.org/t/usercomment-an-ida-plugin-to-show-user-added-comments/19747
#reverse #idapro #plugin
R0 CREW
UserComment: An IDA plugin to show user-added comments
UserComment is a plugin to display user-added comments in disassembly and pseudocode views. Provides a comment window, displaying user-added comments, including comments in assembly code and pseudocode. Support for different types of comments (common commentsβ¦
π6β€2
Dota 2 Under Attack: How a V8 Bug Was Exploited in the Game
https://decoded.avast.io/janvojtesek/dota-2-under-attack-how-a-v8-bug-was-exploited-in-the-game/
#gamehack #expdev #reverse #v8 #exploit
https://decoded.avast.io/janvojtesek/dota-2-under-attack-how-a-v8-bug-was-exploited-in-the-game/
#gamehack #expdev #reverse #v8 #exploit
Gendigital
Dota 2 under attack: How a V8 bug was exploited in the game
Exploiting V8 in Popular Games
π4π€3
Awesome HyperDbg: A list of awesome resources about HyperDbg.
https://github.com/HyperDbg/awesome
#reverse #tools #hyperdbg
https://github.com/HyperDbg/awesome
#reverse #tools #hyperdbg
GitHub
GitHub - HyperDbg/awesome: A list of awesome resources about HyperDbg
A list of awesome resources about HyperDbg. Contribute to HyperDbg/awesome development by creating an account on GitHub.
π₯12π3
Debugging Windows Isolated User Mode (IUM) Processes
In this blog post discussed how to debug Windows' Isolated User Mode (IUM) processes, also known as Trustlets, using the virtual TPM of Microsoft Hyper-V as our target.
https://blog.quarkslab.com/debugging-windows-isolated-user-mode-ium-processes.html
#reverse #windows #trustlets
In this blog post discussed how to debug Windows' Isolated User Mode (IUM) processes, also known as Trustlets, using the virtual TPM of Microsoft Hyper-V as our target.
https://blog.quarkslab.com/debugging-windows-isolated-user-mode-ium-processes.html
#reverse #windows #trustlets
Quarkslab
Debugging Windows Isolated User Mode (IUM) Processes - Quarkslab's blog
In this blog post we discuss how to debug Windows' Isolated User Mode (IUM) processes, also known as Trustlets, using the virtual TPM of Microsoft Hyper-V as our target.
Analysis of CVE-2023-29336 Win32k Privilege Escalation Vulnerability (with POC)
https://www.numencyber.com/cve-2023-29336-win32k-analysis/
#expdev #reverse #windows #poc
https://www.numencyber.com/cve-2023-29336-win32k-analysis/
#expdev #reverse #windows #poc
Numen
Analysis of CVE-2023-29336 Win32k Privilege Escalation
Analyzing CVE-2023-29336 Win32k vulnerability, its exploitation, and mitigation measures in the context of evolving security practices.
π3β€1π1
Advanced Root Detection & Bypass Techniques
In this blog, we will explore techniques related to root detection on Android devices and methods to bypass it. Our main focus will be on the strategies employed by app developers to protect their applications and prevent them from running on compromised devices.
https://8ksec.io/advanced-root-detection-bypass-techniques/
#mobile #android #reverse #frida #root #detection #bypass
In this blog, we will explore techniques related to root detection on Android devices and methods to bypass it. Our main focus will be on the strategies employed by app developers to protect their applications and prevent them from running on compromised devices.
https://8ksec.io/advanced-root-detection-bypass-techniques/
#mobile #android #reverse #frida #root #detection #bypass
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
Advanced Frida Usage Part 5 β Advanced Root Detection & Bypass Techniques
Explore techniques related to root detection on Android devices and methods to bypass it.
π5β€4π1
Use the free Microsoft bing's gpt with ida pro, to perform free analyzes!
https://github.com/p1ay8y3ar/idaBingGPTPlugin
#tools #reverse #idapro #ai
https://github.com/p1ay8y3ar/idaBingGPTPlugin
#tools #reverse #idapro #ai
π8β€6π₯3π1
Reverse Engineering Go Binaries with Ghidra (Part 1)
https://forum.reverse4you.org/t/reverse-engineering-go-binaries-with-ghidra-part-1/20096/1
Reverse Engineering Go Binaries with Ghidra (Part 2)
https://forum.reverse4you.org/t/reverse-engineering-go-binaries-with-ghidra-part-2/20097
#reverse #ghidra #golang
https://forum.reverse4you.org/t/reverse-engineering-go-binaries-with-ghidra-part-1/20096/1
Reverse Engineering Go Binaries with Ghidra (Part 2)
https://forum.reverse4you.org/t/reverse-engineering-go-binaries-with-ghidra-part-2/20097
#reverse #ghidra #golang
R0 CREW
Reverse Engineering Go Binaries with Ghidra (Part 1)
Source: cujo.com Go (also called Golang) is an open source programming language designed by Google in 2007 and made available to the public in 2012. It gained popularity among developers over the years, but itβs not always used for good purposes. As it oftenβ¦
π₯10π6β€2
Titan is a VMProtect devirtualizer
https://github.com/archercreat/titan
#tools #reverse #devirt #devirtualizer #vmp #protector
https://github.com/archercreat/titan
#tools #reverse #devirt #devirtualizer #vmp #protector
GitHub
GitHub - archercreat/titan: Titan is a VMProtect devirtualizer
Titan is a VMProtect devirtualizer. Contribute to archercreat/titan development by creating an account on GitHub.
π₯21β€10π4π3
The installation package for IDA Pro 9.0 Beta 2 available without password.
https://out5.hex-rays.com/beta90_6ba923/
Forum for discussion:
https://forum.reverse4you.org/t/ida-pro-9-0-beta/20459
Chat for discussion:
https://xn--r1a.website/r0_chat/1
#tools #reverse #idapro #windows #linux #macos
https://out5.hex-rays.com/beta90_6ba923/
Forum for discussion:
https://forum.reverse4you.org/t/ida-pro-9-0-beta/20459
Chat for discussion:
https://xn--r1a.website/r0_chat/1
#tools #reverse #idapro #windows #linux #macos
π₯24π8
DJI - The ART of obfuscation
https://blog.quarkslab.com/dji-the-art-of-obfuscation.html
#reverse #mobile #android #obfuscation
https://blog.quarkslab.com/dji-the-art-of-obfuscation.html
#reverse #mobile #android #obfuscation
Quarkslab
DJI - The ART of obfuscation - Quarkslab's blog
Study of an Android runtime (ART) hijacking mechanism for bytecode injection through a step-by-step analysis of the packer used to protect the DJI Pilot Android application.
π₯9β€5π2π΄2
How to Bypass Golang SSL Verification
https://www.cyberark.com/resources/threat-research-blog/how-to-bypass-golang-ssl-verification
#golang #ssl #bypass #reverse #web #pentest
https://www.cyberark.com/resources/threat-research-blog/how-to-bypass-golang-ssl-verification
#golang #ssl #bypass #reverse #web #pentest
Cyberark
How to Bypass Golang SSL Verification
Golang applications that use HTTPS requests have a built-in SSL verification feature enabled by default. In our work, we often encounter an application that uses Golang HTTPS requests, and we have...
π€5π2
C++ Unwind Exception Metadata: a Hidden Reverse Engineering Bonanza
https://www.msreverseengineering.com/blog/2024/8/20/c-unwind-metadata-1
#reverse #cpp #type #reconstruction #hints
https://www.msreverseengineering.com/blog/2024/8/20/c-unwind-metadata-1
#reverse #cpp #type #reconstruction #hints
MΓΆbius Strip Reverse Engineering
C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza β MΓΆbius Strip Reverse Engineering
The worst part of reverse engineering C++ programs -- or really, any program that uses custom structure types with no definitions provided -- is that information about structures is often incomplete, sporadic, and isolated. Consider the following function:
π₯4
Native function and Assembly Code Invocation
https://research.checkpoint.com/2022/native-function-and-assembly-code-invocation/
#reverse #idapro
https://research.checkpoint.com/2022/native-function-and-assembly-code-invocation/
#reverse #idapro
Check Point Research
Native function and Assembly Code Invocation - Check Point Research
Introduction For a reverse engineer, the ability to directly call a function from the analyzed binary can be a shortcut that bypasses a lot of grief. While in some cases it is just possible to understand the function logic and reimplement it in a higher-levelβ¦
π₯10π4π₯°2π€1