Дамп памяти процесса (apk, ios ipa, ...) фридой
https://github.com/Nightbringer21/fridump
Пример:
https://medium.com/@prnz_offl/dumping-android-application-memory-with-fridump-7adf2ca48fa3
https://github.com/Nightbringer21/fridump
Пример:
https://medium.com/@prnz_offl/dumping-android-application-memory-with-fridump-7adf2ca48fa3
GitHub
GitHub - Nightbringer21/fridump: A universal memory dumper using Frida
A universal memory dumper using Frida. Contribute to Nightbringer21/fridump development by creating an account on GitHub.
Frida cкрипт, позволяет расшифровывать schannel TLS трафик (IIS, RDP, IE, Outlook, Powershell,LDAP,...) (проверил, работает на Windows 11. На Win7 не работает)
https://github.com/ngo/win-frida-noscripts/tree/master/lsasslkeylog-easy
Статья:
Decrypting Schannel TLS traffic. Part 1. Getting secrets from lsass
https://github.com/ngo/win-frida-noscripts/tree/master/lsasslkeylog-easy
Статья:
Decrypting Schannel TLS traffic. Part 1. Getting secrets from lsass
What Every Malware Analyst Should Know About PE Relocations
http://malwareid.in/unpack/unpacking-basics/pe-relocation-table
http://malwareid.in/unpack/unpacking-basics/pe-relocation-table
MalwareID Unpacking Guide
PE relocation Table
The Portable Executable (PE) base relocation table is crucial in Windows executable files. It handles memory addresses for functions and data, making sure the program runs well no matter where it's loaded in memory.
Linux Kernel GSM Multiplexing Race Condition Local Privilege Escalation Vulnerability (CVE-2023-6546)
https://github.com/Nassim-Asrir/ZDI-24-020/
https://github.com/Nassim-Asrir/ZDI-24-020/
GitHub
GitHub - zerozenxlabs/ZDI-24-020
Contribute to zerozenxlabs/ZDI-24-020 development by creating an account on GitHub.
Learning Binary Ninja for Reverse Engineering - Scripting Basics and More Part 1
https://www.youtube.com/watch?v=RVyZBqjLrE0
https://www.youtube.com/watch?v=RVyZBqjLrE0
YouTube
Learning Binary Ninja for Reverse Engineering - Scripting Basics and More Part 1
Twitter: https://twitter.com/ficti0n
Web: http://cclabs.io
https://console-cowboys.blogspot.com/
This video goes over learning how to use binary ninja for noscripting
Web: http://cclabs.io
https://console-cowboys.blogspot.com/
This video goes over learning how to use binary ninja for noscripting
impersonating TCC permissions via Electron apps on macOS Sonoma
https://wojciechregula.blog/post/electroniz3r/
https://wojciechregula.blog/post/electroniz3r/
wojciechregula.blog
ELECTRONizing macOS privacy
Publications This research has been presented at:
DEF CON 31 - ELECTRONizing macOS privacy Objective By the Sea - ELECTRONizing macOS Privacy - a New Weapon in Your Red Teaming Armory The backstory In 2019 I wrote a blog post about injecting code to Electron…
DEF CON 31 - ELECTRONizing macOS privacy Objective By the Sea - ELECTRONizing macOS Privacy - a New Weapon in Your Red Teaming Armory The backstory In 2019 I wrote a blog post about injecting code to Electron…
Нашел фазер для джава программ - Juzzer. Надстройка над libFuzzer для фазинга джава программ. Имеет функцию autoFuzz, которая сама генерит входные данные.
Autofuzz: Fuzzing Without Writing Fuzz Targets or Harnesses
Чекнуть быстро докер можно следующей командой:
Autofuzz: Fuzzing Without Writing Fuzz Targets or Harnesses
Чекнуть быстро докер можно следующей командой:
docker run -v /path/result/folder/:/fuzzing -it cifuzz/jazzer-autofuzz org.apache.commons:commons-compress:1.20 org.apache.commons.compress.archivers.sevenz.SevenZFile::new --autofuzz_ignore=java.nio.file.InvalidPathException,java.lang.NullPointerExceptionGitHub
GitHub - CodeIntelligenceTesting/jazzer: Coverage-guided, in-process fuzzing for the JVM
Coverage-guided, in-process fuzzing for the JVM. Contribute to CodeIntelligenceTesting/jazzer development by creating an account on GitHub.
Результат работы (нахождение краша). Также генерит джава код для воспроизведения краша.
how to detect android malware using Random Forest Classifier and explain it use linearsvc
https://github.com/liansecurityOS/android-malware-detection
https://github.com/liansecurityOS/android-malware-detection
GitHub
GitHub - liansecurityOS/android-malware-detection: This is a opensource repo about how to detect android malware using Random Forest…
This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc. - liansecurityOS/android-malware-detection
Time Travel Debugging - Overview
https://learn.microsoft.com/en-us/windows-hardware/drivers/debuggercmds/time-travel-debugging-overview
https://learn.microsoft.com/en-us/windows-hardware/drivers/debuggercmds/time-travel-debugging-overview
Docs
Time Travel Debugging Overview - Windows drivers
Learn how Time Travel Debugging (TTD) captures process execution to replay and debug issues by rewinding your debugger session forwards and backwards.
Две критичных CVE (Integer Overflow) найденных фаззингом
https://securityonline.info/cve-2024-22860-cve-2024-22862-critical-ffmpeg-remote-code-execution-flaws/
https://securityonline.info/cve-2024-22860-cve-2024-22862-critical-ffmpeg-remote-code-execution-flaws/
This media is not supported in your browser
VIEW IN TELEGRAM
Чистка снэпшотов в Virtualbox
Inside the LogoFAIL PoC: From Integer Overflow to Arbitrary Code Execution
https://binarly.io/posts/inside_the_logofail_poc_from_integer_overflow_to_arbitrary_code_execution/index.html
https://binarly.io/posts/inside_the_logofail_poc_from_integer_overflow_to_arbitrary_code_execution/index.html
www.binarly.io
Inside the LogoFAIL PoC: From Integer Overflow to Arbitrary Code Execution
BINARLY LogoFAIL: Learn how a firmware parser flaw can jeopardize device security.
from Windows drivers to an almost fully working EDR
https://sensepost.com/blog/2024/sensecon-23-from-windows-drivers-to-an-almost-fully-working-edr/
https://sensepost.com/blog/2024/sensecon-23-from-windows-drivers-to-an-almost-fully-working-edr/
This framework generates fuzz targets for real-world C/C++ projects with various Large Language Models (LLM) and benchmarks them via the OSS-Fuzz platform.
https://github.com/google/oss-fuzz-gen
https://github.com/google/oss-fuzz-gen
GitHub
GitHub - google/oss-fuzz-gen: LLM powered fuzzing via OSS-Fuzz.
LLM powered fuzzing via OSS-Fuzz. Contribute to google/oss-fuzz-gen development by creating an account on GitHub.