An archive of low-level CTF challenges developed by j00ru over the years https://github.com/j00ru/ctf-tasks #ctf #reverse #dukeBarman
GitHub
GitHub - j00ru/ctf-tasks: An archive of low-level CTF challenges developed over the years
An archive of low-level CTF challenges developed over the years - j00ru/ctf-tasks
[PoC] Windows DHCP Server RCE Vulnerability Analysis (CVE-2019-0626) https://mp.weixin.qq.com/s/OissE9gAVkKmAXuiIUeOLA #windows #expdev #rce #poc #darw1n
Weixin Official Accounts Platform
Windows DHCP Server远程代码执行漏洞分析(CVE-2019-0626)
Windows DHCP Server存在远程代码执行漏洞,当攻击者向DHCP服务器发送精心设计的数据包并成功利用后,就可以在DHCP服务中执行任意代码,漏洞影响范围较大。针对此漏洞,启明星辰ADLab第一时间对其进行了详细分析。
Linux Kernel hooking engine was updated https://github.com/milabs/khook/tree/dev Looking for testers (update is in only dev branch) and help with ARM support #linux #exploit
Finding Undocumented Intel Atom MSR's in the Viliv S5 Through BIOS Reverse Engineering https://stragedevices.blogspot.com/2019/02/finding-verified-intel-atom-msrs-in.html #reverse #bios #dukeBarman
Blogspot
Finding Undocumented Intel Atom MSR's in the Viliv S5 Through BIOS Reverse Engineering
I put "Verified" in the noscript because while I have run a Sandsifter on this project, I have not had time to analyze these opcodes. Rough ...
(CVE-2019-6340) Drupal < 8.6.10 / < 8.5.11 - REST Module Remote Code Execution https://www.ambionics.io/blog/drupal8-rce POC: https://gist.github.com/leonjza/d0ab053be9b06fa020b66f00358e3d88 #web #drupal #rce #poc
Ambionics
Exploiting Drupal8's REST RCE
Exploitation and mitigation bypasses for the new Drupal 8 RCE (SA-CORE-2019-003, CVE-2019-6340), targeting the REST module.
☝️ From March 1, our forum will be temporarily closed for maintenance. Therefore, it will not be available for one or two months. We are sorry for the inconvenience.
Unc0ver Jailbreak has been released for iOS 12 .1.2 to iOS 12 with full functional Cydia. Unc0ver tool compatible with iOS 11 to 11.4.1 Jailbreak too.
Article: https://pangu8.com/jailbreak/unc0ver/
Release: https://github.com/pwn20wndstuff/Undecimus/releases
#ios #jailbreak #expdev #tools #darw1n
Article: https://pangu8.com/jailbreak/unc0ver/
Release: https://github.com/pwn20wndstuff/Undecimus/releases
#ios #jailbreak #expdev #tools #darw1n
Pangu8
Unc0ver Jailbreak [iOS 11-iOS 26.2] – Pangu8
Download Unc0ver Jailbreak IPA for iOS 11- iOS 14.8, Uncover Virtual for iOS 15-iOS 15.8.5 or Unc0ver black for iOS 16 - iOS 18.7.2 & iOS 26-iOS 26.2 using detailed guides
PHP Security Check List
https://github.com/ismailtasdelen/php-security-check-list
#web #pentest #checklist #darw1n
https://github.com/ismailtasdelen/php-security-check-list
#web #pentest #checklist #darw1n
GitHub
GitHub - security-checklist/php-security-check-list: PHP Security Check List [ EN ] 🌋 ☣️
PHP Security Check List [ EN ] 🌋 ☣️. Contribute to security-checklist/php-security-check-list development by creating an account on GitHub.
"The Thunderclap vulnerabilities are security flaws that affect the way modern computers interact with peripheral devices such as network cards, storage, and graphics cards. These vulnerabilities allow an attacker with physical access to a Thunderbolt port to compromise a target machine in a matter of seconds..." Site: http://thunderclap.io/ Paper: http://thunderclap.io/thunderclap-paper-ndss2019.pdf #hardware #dukeBarman
Awesome-WAF: A curated list of awesome web-app firewall (WAF) stuff:
- Fingerprints of almost all known WAFs (80+)
- Popular methods for evasion w/ ex.
- Compiled list of known bypasses for WAFs
- Tools,papers,videos & presentations
https://github.com/0xInfection/Awesome-WAF
#web #pentest #waf #bypass #darw1n
- Fingerprints of almost all known WAFs (80+)
- Popular methods for evasion w/ ex.
- Compiled list of known bypasses for WAFs
- Tools,papers,videos & presentations
https://github.com/0xInfection/Awesome-WAF
#web #pentest #waf #bypass #darw1n
GitHub
GitHub - 0xInfection/Awesome-WAF: Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥
Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥 - 0xInfection/Awesome-WAF
Radare2 team happy to announce Radare Summer of Code this year too. To learn more about RSoC'19 summer internship program visit http://rada.re/rsoc/2019 You will have chance to improve the analysis support, types inference and many other exciting things. #radare2 #reverse #dukeBarman
A journey into IoT – Hardware hacking: UART https://techblog.mediaservice.net/2019/03/a-journey-into-iot-hardware-hacking-uart/ #hardware #dukeBarman
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Hashing Algorithms along with example challenges from CTFs
https://github.com/ashutosh1206/Crypton
#crypto #ctf #darw1n
https://github.com/ashutosh1206/Crypton
#crypto #ctf #darw1n
GitHub
GitHub - ashutosh1206/Crypton: Library consisting of explanation and implementation of all the existing attacks on various Encryption…
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenge...
This post will explain the process of finding and exploiting a previously unknown vulnerability in a real-world piece of software to achieve code execution. The vulnerability was initially found in 2016 and the vendor was contacted however no response was ever received. Now several years later (March 2019 at time of writing), the vulnerability still exists in the latest version.
https://medium.com/@DanielC7/introduction-to-file-format-fuzzing-exploitation-922143ab2ab3
#re #fuzzing #expdev
https://medium.com/@DanielC7/introduction-to-file-format-fuzzing-exploitation-922143ab2ab3
#re #fuzzing #expdev
Medium
Introduction to File Format Fuzzing & Exploitation
This post will explain the process of finding and exploiting a previously unknown vulnerability in a real-world piece of software to…
NSA releases own software reverse engineering (SRE) suite - GHIDRA
Site: https://ghidra-sre.org/
Github: https://github.com/NationalSecurityAgency/ghidra
Direct link: https://ghidra-sre.org/ghidra_9.0_PUBLIC_20190228.zip
P.S. Don't forget about checking backdoors ;)
#reverse #dukeBarman
Site: https://ghidra-sre.org/
Github: https://github.com/NationalSecurityAgency/ghidra
Direct link: https://ghidra-sre.org/ghidra_9.0_PUBLIC_20190228.zip
P.S. Don't forget about checking backdoors ;)
#reverse #dukeBarman
GitHub
GitHub - NationalSecurityAgency/ghidra: Ghidra is a software reverse engineering (SRE) framework
Ghidra is a software reverse engineering (SRE) framework - NationalSecurityAgency/ghidra
r0 Crew (Channel)
NSA releases own software reverse engineering (SRE) suite - GHIDRA Site: https://ghidra-sre.org/ Github: https://github.com/NationalSecurityAgency/ghidra Direct link: https://ghidra-sre.org/ghidra_9.0_PUBLIC_20190228.zip P.S. Don't forget about checking…
ghidra_9.0_PUBLIC_20190228.zip
272.4 MB
#GHIDRA (NSA Reverse Engineering Suite)
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks (new meltdown?) https://arxiv.org/pdf/1903.00446.pdf #hardware #dukeBarman