ReCopilot: A Reverse Engineering Copilot for Boosting Binary Analysis with Decompiler
#reverse_engineering #reversing #copilot
@ZwLowLevel
https://github.com/XingTuLab/recopilot
GitHub
GitHub - XingTuLab/recopilot: ReCopilot: Reverse Engineering Copilot in Binary Analysis
ReCopilot: Reverse Engineering Copilot in Binary Analysis - XingTuLab/recopilot
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
EDR-AppLocker
Blocking EDRs with AppLocker
Blocking EDRs with AppLocker
#applocker #edr_tampering
#edr_bypass #edr_evasion
@ZwLowLevel
https://github.com/zero2504/EDR-AppLocker
#firmware_hacking #firmware_analysis
#reverse_engineering #reversing
#secure_boot
@ZwLowLevel
https://hackmag.com/security/esp32-hack
Please open Telegram to view this post
VIEW IN TELEGRAM
HackMag
Defeating ESP32 Security: Extracting Flash Encryption and Secure Boot Keys
Tech magazine for cybersecurity specialists
🔥1
Low Level CO 🇨🇴 pinned «🧐 Virtual to Physical Address Translation Explained #windows_internals #virtual_address @ZwLowLevel»
#pentesting_web #web_security
@ZwLowLevel
https://www.hacktron.ai/blog/hacking-openai-atlas-browser
Please open Telegram to view this post
VIEW IN TELEGRAM
Hacktron AI
Pwning OpenAI Atlas Through Exposed Browser Internals
A critical ChatGPT Atlas Browser vulnerability: XSS on an OpenAI subdomain let attackers hijack tabs, leak browsing URLs, and steal OAuth tokens.
EDR evasion for Red Teamers
#edr_bypass #edr_evasion
#malware_development #malware_development
#windows_internals
@ZwLowLevel
https://github.com/Excalibra/Antivirus-EDR-Evasion-Bypass-for-Pentesters-Red-Teamers
GitHub
GitHub - Excalibra/Antivirus-EDR-Evasion-Bypass-for-Pentesters-Red-Teamers: Antivirus EDR evasion bypass for pentesters red teamers
Antivirus EDR evasion bypass for pentesters red teamers - Excalibra/Antivirus-EDR-Evasion-Bypass-for-Pentesters-Red-Teamers
Please open Telegram to view this post
VIEW IN TELEGRAM
hunt.io
Malicious VSCode Extension Launches Multi-Stage Attack Chain with Anivia Loader and OctoRAT
A fake VSCode extension triggered a multi-stage attack deploying the Anivia loader and OctoRAT. Learn how the chain worked and where defenders can detect it. Learn more.
40_Marvell_Kuemerle_final.pdf
1.4 MB
Memory: Almost
The Only Thing That Matters
A revolution in memory architecture for the data center
The Only Thing That Matters
A revolution in memory architecture for the data center
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - 0x536b796ec3b578/injectum: The modern, type-safe process injection framework for Red Teams and Offensive Security in Rust.
The modern, type-safe process injection framework for Red Teams and Offensive Security in Rust. - 0x536b796ec3b578/injectum