A refreshed web site for Hex-Rays https://www.hex-rays.com/blog/a-refreshed-web-site-for-hex-rays/ #ida
Magisk Module to enable engineering build props https://github.com/evdenis/enable_eng #reverse #hardware #android #dukeBarman
GitHub
GitHub - evdenis/enable_eng: Magisk Module to enable engineering build props
Magisk Module to enable engineering build props. Contribute to evdenis/enable_eng development by creating an account on GitHub.
Fugu is the first open source jailbreak based on the checkm8 exploit https://github.com/LinusHenze/Fugu #exploitation #ios #dukeBarman
GitHub
GitHub - LinusHenze/Fugu: Fugu is the first open source jailbreak based on the checkm8 exploit
Fugu is the first open source jailbreak based on the checkm8 exploit - LinusHenze/Fugu
Skeleton project for your own GRUB-based bootkit https://github.com/mgrube/GRUBKit #exploitation
GitHub
GitHub - mgrube/GRUBKit: Skeleton project for your own GRUB-based bootkit
Skeleton project for your own GRUB-based bootkit. Contribute to mgrube/GRUBKit development by creating an account on GitHub.
What's in a (task) name (Fixing a bug in lsmp(1)) http://newosxbook.com/articles/lsmp.html #ios #dukeBarman
checkra1n for Linux is now available at https://checkra.in! 🌧📲 Checkra1n team has also released the webra1n, a web interface for checkra1n designed for headless computers (like a raspberry pi) #exploitation #ios #dukeBarman
checkra.in
checkra1n
Jailbreak for iPhone 5s through iPhone X, iOS 12.0 and up
Reversing WannaCry Part 2 - Diving into the malware with Ghidra https://www.youtube.com/watch?v=Q90uZS3taG0 #reverse #ghidra #malware #dukeBarman
YouTube
Reversing WannaCry Part 2 - Diving into the malware with #Ghidra
In the second video of the "Reversing WannaCry" series we continue to dive into the malware and find some encrypted components and the first traces of the decryption & encryption functionality of the ransomware. We also learn how to use OOAnalyzer to easily…
ReHLDS is a result of reverse engineering of original HLDS (build 6152/6153) using DWARF debug info embedded into linux version of HLDS, engine_i486.so https://github.com/dreamstalker/rehlds #reverse #dukeBarman
GitHub
GitHub - rehlds/ReHLDS: Enhanced version of the HLDS engine with bug fixes, security patches, and optimizations for stable servers.
Enhanced version of the HLDS engine with bug fixes, security patches, and optimizations for stable servers. - rehlds/ReHLDS
"HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation" & "HALfuzz: fuzzing-oriented version of HALucinator"
Article: http://hexhive.epfl.ch/publications/files/20SEC2.pdf
Code: https://github.com/embedded-sec/halucinator
#reverse #fuzzing #dukeBarman
Article: http://hexhive.epfl.ch/publications/files/20SEC2.pdf
Code: https://github.com/embedded-sec/halucinator
#reverse #fuzzing #dukeBarman
USB Raw Gadget is a kernel module that allows to emulate USB devices from userspace https://github.com/xairy/raw-gadget #linux #dukeBarman
GitHub
GitHub - xairy/raw-gadget: USB Raw Gadget — a low-level interface for the Linux USB Gadget subsystem
USB Raw Gadget — a low-level interface for the Linux USB Gadget subsystem - xairy/raw-gadget
Recon 2019 video have been released https://recon.cx/2020/montreal/video/index.html #reverse #recon #conference #dukeBarman
Sdbg is a Smali debugger powered by SmaliVM https://github.com/CalebFenton/simplify/tree/master/sdbg #android #debugger #dukeBarman
GitHub
simplify/sdbg at master · CalebFenton/simplify
Android virtual machine and deobfuscator. Contribute to CalebFenton/simplify development by creating an account on GitHub.
https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html #malware #ida #uid_681139319
Virustotal
Official VirusTotal Plugin for IDA Pro 7
ATTENTION : In order to use the content search functionality you will need to have access to VT Intelligence . If you want to jump str...
Analyzing WhatsApp Calls with Wireshark, radare2 and Frida https://medium.com/@schirrmacher/analyzing-whatsapp-calls-176a9e776213 #reverse #mobile #radare2 #frida #dukeBarman
Medium
Analyzing WhatsApp Calls
How I revealed parts of the VoIP protocol with Wireshark, radare2 and Frida.
Finding CWE-369: Divide By Zero bugs with Binary Ninja (Part 1) https://medium.com/@cetfor/finding-cwe-369-divide-by-zero-bugs-with-binary-ninja-part-1-e14b484b2551 #reverse #exploitation #binaryninja #dukeBarman
Medium
Finding CWE-369: Divide By Zero bugs with Binary Ninja (Part 1)
In this short series of long articles we’re going to take a look at automating the process of finding CWE-369: Divide By Zero…
Exploiting a type confusion bug in radare2's pyc plugin https://pr0cf5.github.io/ctf/2020/02/09/exploiting-a-bug-in-radare-plugin.html #exploitation #ctf #dukeBarman
x0rro — A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2 https://iwantmore.pizza/posts/x0rro.html #reverse #dukeBarman
Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories https://github.com/malrev/ABD #reverse #dukeBarman
GitHub
GitHub - malrev/ABD: Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories
Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories - malrev/ABD