امیدوارم استفاده از blake3 به جای SHA256 بیشتر شود نه به خاطر اینکه به شدت امن است یا SHA256 که پایه آن SHA1 ضعیف است یاحتی توسط NSA ساخته شده، بلکه به این دلیل که مشترکا توسط مهندسین نرمافزار و رمزنگارها طراحی شده که Performance شدیدا بهتری دارد.
peergos.org/posts/blake3
VAHID NAMENI✍
peergos.org/posts/blake3
VAHID NAMENI✍
Igor’s Tip of the Week #165: Defining floating-point data
hex-rays.com/blog/igors-tip-…
hex-rays.com/blog/igors-tip-…
Analysis of Vanguard's guarded regions (Windows game anti-cheating systems internals)
Excellent blog post by @Xyrem256
reversing.info/posts/guarded…
Excellent blog post by @Xyrem256
reversing.info/posts/guarded…
#Analytics
#Sec_code_review
Top System Programming Vulnerabilities
https://rezaduty-1685945445294.hashnode.dev/top-system-programming-vulnerabilities
#Sec_code_review
Top System Programming Vulnerabilities
https://rezaduty-1685945445294.hashnode.dev/top-system-programming-vulnerabilities
🎃1
Reverse Engineering resources.
• Books;
• Courses;
• Practice;
• Hex Editors;
• Binary Format;
• Disassemblers;
• Binary Analysis;
• Bytecode Analysis;
• Import Reconstruction;
• Dynamic Analysis;
• Debugging;
• Mac Decrypt;
• Document Analysis;
• Scripting;
• Android;
• Yara;
https://github.com/wtsxDev/reverse-engineering
#reverse #engineering
• Books;
• Courses;
• Practice;
• Hex Editors;
• Binary Format;
• Disassemblers;
• Binary Analysis;
• Bytecode Analysis;
• Import Reconstruction;
• Dynamic Analysis;
• Debugging;
• Mac Decrypt;
• Document Analysis;
• Scripting;
• Android;
• Yara;
https://github.com/wtsxDev/reverse-engineering
#reverse #engineering
GitHub
GitHub - wtsxDev/reverse-engineering: List of awesome reverse engineering resources
List of awesome reverse engineering resources. Contribute to wtsxDev/reverse-engineering development by creating an account on GitHub.
Assembly Language for x86 Processors.pdf
11.5 MB
‼️ Assembly Language for x86 Processors, 7th Edition
Slides deck on signal handling in Linux
courses.cms.caltech.edu/cs12…
courses.cms.caltech.edu/cs12…
Mockingjay revisisted - Process stomping and loading beacon with sRDI
naksyn.com/edr%20evasion/202…
naksyn.com/edr%20evasion/202…
Event Tracing for Windows (ETW) is crucial for modern EDR solutions. But what do you really know about its internal workings? Dive into ETW to discover useful attack targets and forensic information.
https://blog.trailofbits.com/2023/11/22/etw-internals-for-security-research-and-forensics/
@islemolecule_SOURCE
https://blog.trailofbits.com/2023/11/22/etw-internals-for-security-research-and-forensics/
@islemolecule_SOURCE
🎃2
Forwarded from vx-underground
Media is too big
VIEW IN TELEGRAM
Today EUROPOL in conjunction with the Ukraine National Police arrested individuals operating a ransomware group out of Ukraine. The group is believed to be behind the ransoming of 'over 1,000 servers'.
They released footage of some of the arrests
They released footage of some of the arrests
🤓1
#pwn #edu #guide
Understanding the Heap - a beautiful mess
https://jackfromeast.site/2023-01/understand-the-heap-a-beautiful-mess.html
See also heap exploitation series
#heap , #internals ,
Understanding the Heap - a beautiful mess
https://jackfromeast.site/2023-01/understand-the-heap-a-beautiful-mess.html
See also heap exploitation series
#heap , #internals ,
❤🔥4