https://www.rtl-sdr.com/software-defined-radio-for-engineers-free-university-level-text-book-with-plutosdr-examples/
прямая ссылка на книгу
http://www.analog.com/media/en/training-seminars/design-handbooks/Software-Defined-Radio-for-Engineers-2018/SDR4Engineers.pdf #OKOB2016
прямая ссылка на книгу
http://www.analog.com/media/en/training-seminars/design-handbooks/Software-Defined-Radio-for-Engineers-2018/SDR4Engineers.pdf #OKOB2016
rtl-sdr.com
Software Defined Radio for Engineers: Free University Level Text Book with PlutoSDR Examples
Analog Devices has recently released a new text book for free called "Software-Defined Radio for Engineers, 2018". This is an advanced university level text book that covers communication systems theory as well as software defined radio theory and practice.…
Marion Marschalek - 50 shades of Visual Studio - H2HC 2017 https://www.youtube.com/watch?v=H1RIuzc5K6s #conference #dukeBarman
YouTube
Marion Marschalek - 50 shades of Visual Studio - H2HC 2017
Forwarded from Noise Security Bit
Новый эпизод Noise Security Bit 0x19 (о ML/AI и его реальной применимости в задачах ИБ) уже в эфире!! https://noisebit.podster.fm/25
Podster
Noise Security Bit 0x19 (о ML/AI и его реальной применимости в задачах ИБ) | Noise Security Bit
Обсуждаем ML/AI и его реальную применимость в различных задачах ИБ. У нас в гостях: @Dor3s @tracer0tong @d_olex @sh2kerr и @ahack_ru.
Обсудили много всего, начиная от АВ, атак на модели машинного обучения и затронули темы с автоматизацией фазинга. Получилась…
Обсудили много всего, начиная от АВ, атак на модели машинного обучения и затронули темы с автоматизацией фазинга. Получилась…
frida cli for reverse engineer inspired by the epic GDB https://github.com/iGio90/frick #frida #dukeBarman
GitHub
GitHub - iGio90/frick: frick - aka the first debugger built on top of frida
frick - aka the first debugger built on top of frida - iGio90/frick
A repository for learning various heap exploitation techniques. https://github.com/shellphish/how2heap #expdev #linux #heap #darw1n
GitHub
GitHub - shellphish/how2heap: A repository for learning various heap exploitation techniques.
A repository for learning various heap exploitation techniques. - shellphish/how2heap
Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 2 https://www.megabeets.net/decrypting-dropshot-with-radare2-and-cutter-part-2/ #malware #radare2 #dukeBarman
Megabeets
Decrypting APT33's Dropshot Malware with Radare2 and Cutter – Part 2
In this part, we'll continue the analysis of APT33's Dropshot using Cutter, a GUI for radare2. We'll learn how to decrypt Dropshot's payload and write a noscript to do it quickly.
https://gamasutra.com/view/news/320229/Reverseengineered_Diablo_source_code_released_on_GitHub.php #games #reverse #dukeBarman
GAMASUTRA
Reverse-engineered Diablo source code released on GitHub
Heads up, devs: someone who goes by "GalaxyHaxz" has uploaded what appears to be a reverse-engineered version of the original source code (but no game assets) for Blizzard's pioneering 1996 game Diablo to GitHub. While both Diablo
Материалы школы Информационной Безопасности в Яндексе https://academy.yandex.ru/events/system_administration/msk-2018/ #study #yandex #dukeBarman
education.yandex.ru
Яндекс Образование
Делимся знаниями и навыками, чтобы вместе реализовывать самые смелые идеи, расширять границы IT и создавать будущее уже сейчас
Static instrumentation based on executable file formats http://romainthomas.fr/slides/18-06-Recon18-Formats-Instrumentation.pdf #reverse #dukeBarman
Unpacking and Extracting TrickBot Malware Configuration With x64dbg and Python https://www.youtube.com/watch?v=EdchPEHnohw #malware #dukeBarman
YouTube
Unpacking and Extracting TrickBot Malware Configuration With x64dbg and Python
Open Analysis Live! We unpack TrickBot and extract it's configuration file using x64dbg and a Python noscript from the KevinTheHermit project. Expand for more...
-----
OALABS DISCORD
https://discord.gg/6h5Bh5AMDU
OALABS PATREON
https://www.patreon.com/oalabs…
-----
OALABS DISCORD
https://discord.gg/6h5Bh5AMDU
OALABS PATREON
https://www.patreon.com/oalabs…
https://www.malwaretech.com/beginner-malware-reversing-challenges #malware #hackquest #crackme #dukeBarman
Malwaretech
MalwareTech Labs - Learn Reverse Engineering & Malware Analysis
Practical reverse engineering labs designed to imitate real-world malware techniques, helping beginners improve their skills in a safe and fun way.
Meaningful Variable Names for Decompiled Code: A Machine Translation Approach https://cmustrudel.github.io/papers/icpc18decompilation.pdf #reverse #decompilation #dukeBarman
A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory Paper: http://spw18.langsec.org/papers/Kawakami-Exploit-modeling-using-set-theory.pdf Slides: http://spw18.langsec.org/slides/Kawakami-Exploit-modeling-using-set-theory.pdf #exploit #dukeBarman
Android Crackme and Structure offset propagation http://radare.today/posts/crackme_with_tl/ #radare2 #android #dukeBarman
radareorg.github.io
Android Crackme and Structure offset propagation
Today we will look into the recently introduced feature in r2 - structure offset propagation.
We will use it to solve a crackme based on reversing an Android JNI (Java Native Interface) library.Beware that the feature is still WIP and being constantly improved.…
We will use it to solve a crackme based on reversing an Android JNI (Java Native Interface) library.Beware that the feature is still WIP and being constantly improved.…