r0 Crew (Channel) – Telegram
r0 Crew (Channel)
8.8K subscribers
35 photos
1 video
9 files
1.98K links
Security Related Links:
- Reverse Engineering;
- Malware Research;
- Exploit Development;
- Pentest;
- etc;

Join to chat: @r0crew_bot 👈

Forum: https://forum.reverse4you.org
Twitter: https://twitter.com/R0_Crew
Download Telegram
JEB 3.7.0 Merry Xmas Edition by DimitarSerg

1. Maximum license type (copying, noscripts, etc. work now).
2. Fixed integrity check #1.
3. Fixed integrity check #2.
4. All the telemetry has been cut out.
5. Removed the update checks and other shit that tries to connect to the Internet.
6. Added/reconstructed saving/loading project function.
7. Decompilation of missing opcodes for Android has been restored.
8. Restored display of variable values when hovering over them during debugging (Android).
9. Decompiling for other platforms was fixed (tested x86/x64, webAssembly, MIPS, ARM).

Instruction:
1. Replace the original JEB.jar with fixed.
2. Register it with Keygen (run it: java Keygen)

https://forum.reverse4you.org/t/11035

#re #mobile #tools #jeb #DimitarSerg
Root cause analysis and exploit for a Windows kernel ws2ifsl.sys use-after-free vulnerability.

https://labs.bluefrostsecurity.de/blog/2020/01/07/cve-2019-1215-analysis-of-a-use-after-free-in-ws2ifsl/

#re #expdev #uaf #windows #darw1n
Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics) https://github.com/guyinatuxedo/nightmare #reverse #exploitation #dukeBarman
UEFI modules analysing with BinDiff IDA plugin https://yeggor.github.io/UEFI_BinDiff/ #reverse #dukeBarman
GTFOBins is a curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions.

https://gtfobins.github.io/

#pentest #redteam #ctf #linux #darw1n