-
VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor https://github.com/changeofpace/VivienneVMM …
#exploitation#dukeBarman -
#ghidra plugin for easy patch diffing source https://github.com/threatrack/ghidra-patchdiff-correlator … article: https://blog.threatrack.de/2019/10/10/ghidra-correlator/ …#reverse#dukeBarman -
BAP 2.0 is finally out! https://discuss.ocaml.org/t/ann-bap-2-0-release/4719 …
#reverse#dukeBarman#BAP#BinaryAnalysis -
T-Fuzz - a fuzzing tool based on program transformation and Crash Analyzer. Slides: http://nebelwelt.net/publications/files/18Oakland-presentation.pdf … WP: http://nebelwelt.net/publications/files/18Oakland.pdf … Based on angr, radare2. https://github.com/HexHive/T-Fuzz
#radare2#dukeBarman -
Analysis of Qualcomm Secure Boot Chains https://blog.quarkslab.com/analysis-of-qualcomm-secure-boot-chains.html …
#hardware#dukeBarman -
A set of Linux binary exploitation tasks for beginners https://github.com/xairy/easy-linux-pwn …
#exploit#dukeBarman -
Reversing malware in a custom format: Hidden Bee elements https://blog.malwarebytes.com/threat-analysis/2018/08/reversing-malware-in-a-custom-format-hidden-bee-elements/ …
#malware#dukeBarman via@vxlab_infopic.twitter.com/fiq8iQM38U
-
Solving game2 from the badge of Black Alps 2017 with radare2 https://dustri.org/b/solving-game2-from-the-badge-of-black-alps-2017-with-radare2.html …
#radare2#re#crackme#dukeBarman -
Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer (interview with axi0mX) https://arstechnica.com/information-technology/2019/09/developer-of-checkm8-explains-why-idevice-jailbreak-exploit-is-a-game-changer/ …
#exploit#ios#dukeBarman -
A template project for creating a shellcode for the Cisco IOS in the C language https://github.com/embedi/tcl_shellcode …
#cisco#pwn#dukeBarman#github -
Slides of the
#r2con2017 Diaphora talk https://github.com/radareorg/r2con-2017/tree/master/talks/diaphora …#radare2#r2con#diaphora#dukeBarman#github -
"Building universal Android rooting with a type confusion vulnerability" (Zerocon 2019) Slides: https://github.com/ThomasKing2014/slides/blob/master/Building%20universal%20Android%20rooting%20with%20a%20type%20confusion%20vulnerability.pdf … Demo: https://www.youtube.com/watch?v=zHEQ8fOLSrM&feature=youtu.be …
#android#exploitation#dukeBarman -
IOHIDeous 0day macOS-only vulnerability in IOHIDFamily https://siguza.github.io/IOHIDeous
#exploit#reverse#dukeBarman
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.