A foray into Linux kernel exploitation on Android
https://mcyoloswagham.github.io/linux
@reverseengine
https://mcyoloswagham.github.io/linux
@reverseengine
mcyoloswagham.github.io
A foray into Linux kernel exploitation on Android
In November of 2020, I decided to dive into the world of Android, more specifically the linux kernel. I did this because earlier in the year, around February, I broke my old phone during a skiing trip and hastily bought a cheap android phone, the Alcatel…
❤2
Hyper-V debugging for beginners 2nd edition
https://hvinternals.blogspot.com/2021/01/hyper-v-debugging-for-beginners-2nd.html
@reverseengine
https://hvinternals.blogspot.com/2021/01/hyper-v-debugging-for-beginners-2nd.html
@reverseengine
Blogspot
Hyper-V debugging for beginners. 2nd edition.
hyper-v internals
❤1
Hyper-V memory internals. EXO partition memory access
https://hvinternals.blogspot.com/2020/06/hyper-v-memory-internals-exo-partition.html
@reverseengine
https://hvinternals.blogspot.com/2020/06/hyper-v-memory-internals-exo-partition.html
@reverseengine
Blogspot
Hyper-V memory internals. EXO partition memory access
hyper-v internals
❤1
Multi-disassemblers collaboration framework for reverse engineering
https://github.com/Martyx00/CollaRE
@reverseengine
https://github.com/Martyx00/CollaRE
@reverseengine
GitHub
GitHub - Martyx00/CollaRE: Multi-tool reverse engineering collaboration solution.
Multi-tool reverse engineering collaboration solution. - Martyx00/CollaRE
❤1
How To Reverse Engineer RC4 Crypto For Malware Analysis
https://www.youtube.com/watch?v=-EQKiIbOLEc
@reverseengine
https://www.youtube.com/watch?v=-EQKiIbOLEc
@reverseengine
YouTube
How To Reverse Engineer RC4 Crypto For Malware Analysis
View our malware analysis training: https://AGDCservices.com/training/
Follow me on Twitter for RE tips and resources: https://twitter.com/AGDCservices
View our malware analysis products to aid in your RE efforts (Ghidra / python noscripts, tools, and individual…
Follow me on Twitter for RE tips and resources: https://twitter.com/AGDCservices
View our malware analysis products to aid in your RE efforts (Ghidra / python noscripts, tools, and individual…
❤1
Reverse Engineering iMessage: Leveraging the Hardware to Protect the Software
https://www.nowsecure.com/blog/2021/01/27/reverse-engineering-imessage-leveraging-the-hardware-to-protect-the-software
@reverseengine
https://www.nowsecure.com/blog/2021/01/27/reverse-engineering-imessage-leveraging-the-hardware-to-protect-the-software
@reverseengine
Nowsecure
Reverse Engineering iMessage to Help Improve Security | NowSecure
Our researcher reverse engineered Apple iMessage to explore extending it the secure messaging app to other systems. See how he fared.
❤1
ReCopilot: A Reverse Engineering Copilot for Boosting Binary Analysis with Decompiler
https://github.com/XingTuLab/recopilot
@reverseengine
https://github.com/XingTuLab/recopilot
@reverseengine
GitHub
GitHub - XingTuLab/recopilot: ReCopilot: Reverse Engineering Copilot in Binary Analysis
ReCopilot: Reverse Engineering Copilot in Binary Analysis - XingTuLab/recopilot
❤1
[Reverse Engineering Tips] — Binary Diffing
https://medium.com/malware-buddy/reverse-engineering-tips-binary-diffing-17760bd89f39
@reverseengine
https://medium.com/malware-buddy/reverse-engineering-tips-binary-diffing-17760bd89f39
@reverseengine
Medium
[Reverse Engineering Tips] — Binary Diffing
Binary diffing is a great way to visualize and spot differences in multiple samples. As a malware researcher, this is useful for…
❤1
Introduction to Ghidra Scripting for Embedded ELFs and UPX
https://www.archcloudlabs.com/projects/ghidra_noscripting_01
@reverseengine
https://www.archcloudlabs.com/projects/ghidra_noscripting_01
@reverseengine
Arch Cloud Labs
Introduction to Ghidra Scripting for Embedded ELFs and UPX
About the Project The more Cryptominer malware I look at (or anything targeting Linux), the more trends I’ve identified that are common regardless of the underlying intent. Everyone loves to use UPX.
And why wouldn’t they? It’s a free Open Source packer that…
And why wouldn’t they? It’s a free Open Source packer that…
❤1
Hacking in an epistolary way: implementing kerberoast in pure VBA
https://adepts.of0x.cc/kerberoast-vba-macro
@reverseengine
https://adepts.of0x.cc/kerberoast-vba-macro
@reverseengine
Hacking in an epistolary way: implementing kerberoast in pure VBA |
Hacking in an epistolary way: implementing kerberoast in pure VBA | AdeptsOf0xCC
Creating a macro for Excel in VBA to perform kerberoast attacks
❤1
How to use Ghidra to Reverse Engineer Mobile Application
https://medium.com/bugbountywriteup/how-to-use-ghidra-to-reverse-engineer-mobile-application-c2c89dc5b9aa
@reverseengine
https://medium.com/bugbountywriteup/how-to-use-ghidra-to-reverse-engineer-mobile-application-c2c89dc5b9aa
@reverseengine
Medium
How to use Ghidra to Reverse Engineer Mobile Application
Unveil the
❤1