CTFZone 2019 (http://ctftime.org/event/894) jeopardy-style online quals start on November 30 and will last for 36 hours. Hurry up to register, and find out more about the rules http://ctf.bi.zone! #CTF #dukeBarman
ctftime.org
CTFZone 2019 Quals
BI.ZONE is ready to announce the date of CTFZone quals 2019!
The first online stage will take place on November 30 a...
The first online stage will take place on November 30 a...
RSoC 2019 Final: Console Interface Improvements https://radareorg.github.io/blog/posts/rsoc-2019-console-interface-improvement/ #radare2 #reverse #dukeBarman
radareorg.github.io
RSoC 2019 Final: Console Interface Improvements
RSoC 2019 Final: Console Interface Improvements Introduction: Hello all, I’m deepakchethan from India. I got to work on the console interface improvements for radare2 as a part of 2019’s edition of Radare Summer of Code. My main task was to improve the terminal…
Extract labels from IDA .lst or Ghidra .csv file and export x64dbg database https://github.com/utkonos/lst2x64dbg #reverse #ghidra #radare2 #dukeBarman
GitHub
GitHub - utkonos/lst2x64dbg: Extract labels from IDA, Ghidra, Binary Ninja, and Relyze files and export x64dbg database. Including…
Extract labels from IDA, Ghidra, Binary Ninja, and Relyze files and export x64dbg database. Including radare2 main address. - utkonos/lst2x64dbg
ZeroNights Hackquest 2019. Results & Writeups
https://habr.com/ru/company/dsec/blog/472416/
#re #web #writeup #darw1n
https://habr.com/ru/company/dsec/blog/472416/
#re #web #writeup #darw1n
Хабр
ZeroNights Hackquest 2019. Results & Writeups
Совсем недавно завершился ежегодный HackQuest, приуроченный к конференции ZeroNights. Как и в прошлые годы, участникам предстояло решить 7 различных заданий — по одному на сутки квеста. Задания,...
ZeroNights HackQuest: Micosoft Linux (How to Solve):
https://github.com/icecube27/ctf-writeups/tree/master/2019/Zeronights-Hackquest/micosoft-linux
#re #writeup #darw1n
https://github.com/icecube27/ctf-writeups/tree/master/2019/Zeronights-Hackquest/micosoft-linux
#re #writeup #darw1n
GitHub
ctf-writeups/2019/Zeronights-Hackquest/micosoft-linux at master · icecube27/ctf-writeups
Contribute to icecube27/ctf-writeups development by creating an account on GitHub.
🔥 OFFZONE 2020 — April 16-17, Moscow, Russia. Save the date!
Call for Papers is now officially open — get your talk proposals submitted.
https://offzone.moscow/2020-call-for-papers/
Make sure to check out Speaker Benefits and CFP Principles.
See you at OFFZONE 2020!
Call for Papers is now officially open — get your talk proposals submitted.
https://offzone.moscow/2020-call-for-papers/
Make sure to check out Speaker Benefits and CFP Principles.
See you at OFFZONE 2020!
The C/C++ code analysis platform Joern has been resurrected!
https://medium.com/@fabs_60995/joern-reborn-f04e74399b2b
https://github.com/ShiftLeftSecurity/joern/releases #darw1n
https://medium.com/@fabs_60995/joern-reborn-f04e74399b2b
https://github.com/ShiftLeftSecurity/joern/releases #darw1n
Medium
Joern Reborn
In a blog post back in May 2018, we outlined our plans for saving the open-source C/C++ code analyzer “Joern”. Today, we are happy to…
An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis
https://github.com/toor-de-force/Ghidra-to-LLVM
#re #llvm #ghidra #darw1n
https://github.com/toor-de-force/Ghidra-to-LLVM
#re #llvm #ghidra #darw1n
GitHub
GitHub - toor-de-force/Ghidra-to-LLVM: An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis
An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis - toor-de-force/Ghidra-to-LLVM
A NTFS Bug in MFT parsing! Plug a USB key and BSOD (probably not exploitable by plug&pwn)! Microsoft WONTFIX.
https://exatrack.com/public/vuln_NTFS_EN.pdf
#re #bsod #expdev #darw1n
https://exatrack.com/public/vuln_NTFS_EN.pdf
#re #bsod #expdev #darw1n
Advancing Windows Security (PSEC 2019) https://www.platformsecuritysummit.com/2019/speaker/weston/ #windows #PSEC #videos #dukeBarman
The Evolution of Advanced Threats: REsearchers Arms Race https://www.platformsecuritysummit.com/2019/speaker/matrosov/ #hardware #PSEC #videos #dukeBarman
r2pipe noscript to autorename all the functions by recovering the original name from the assert statements https://gist.github.com/radare/04612d3804fa72c0cc832d06208cadaf #reverse #radare2 #dukeBarman
Gist
radare2 noscript to autoname functions by taking it from the assert calls
radare2 noscript to autoname functions by taking it from the assert calls - assnam.py
Technical analysis of the #checkm8 exploit https://habr.com/en/company/dsec/blog/472762/ #ios #exploit #dukeBarman
Habr
Technical analysis of the checkm8 exploit
Most likely you've already heard about the famous exploit checkm8, which uses an unfixable vulnerability in the BootROM of most iDevices, including iPhone X.
Windows 10 (RS1-19H2+) UAC bypass using EditionUpgradeManager undocumented autoelevated COM interface. Works together with environment variables spoofing,
https://gist.github.com/hfiref0x/de9c83966623236f5ebf8d9ae2407611
#re #redteam #uac #darw1n
https://gist.github.com/hfiref0x/de9c83966623236f5ebf8d9ae2407611
#re #redteam #uac #darw1n
Gist
UAC bypass using EditionUpgradeManager COM interface
UAC bypass using EditionUpgradeManager COM interface - akagi_58a.c
Export a binary from ghidra to emulate with unicorn https://github.com/AndrewFasano/ghidra-unicorn #reverse #ghidra #dukeBarman
GitHub
GitHub - AndrewFasano/ghidra-unicorn: Export a binary from ghidra to emulate with unicorn
Export a binary from ghidra to emulate with unicorn - AndrewFasano/ghidra-unicorn
Ghidra C++ Class and Run Time Type Information Analyzer https://github.com/astrelsky/Ghidra-Cpp-Class-Analyzer #reverse #ghidra #dukeBarman
GitHub
GitHub - astrelsky/Ghidra-Cpp-Class-Analyzer: Ghidra C++ Class and Run Time Type Information Analyzer
Ghidra C++ Class and Run Time Type Information Analyzer - astrelsky/Ghidra-Cpp-Class-Analyzer
Analysis of Qualcomm Secure Boot Chains https://blog.quarkslab.com/analysis-of-qualcomm-secure-boot-chains.html #hardware #dukeBarman
Quarkslab
Analysis of Qualcomm Secure Boot Chains - Quarkslab's blog
Qualcomm is the market-dominant hardware vendor for non-Apple smartphones. Considering the [SoCs] they produce are predominant, it has become increasingly interesting to reverse-engineer and take over their boot chain in order to get a hold onto the highest…