0xHex_SSL's profile picture.

0xHex

@0xHex_SSL

0xHex reposted

Our Online Store is now live. Individual researchers and hobbyists can now purchase our Intel JTAG debugger, and debug the undebuggable internals of Windows. The software license, AAEON hardware and DCI cable are available here: asset-intertech.com/products/sourc…

AlanSguigna's tweet image. Our Online Store is now live. Individual researchers and hobbyists can now purchase our Intel JTAG debugger, and debug the undebuggable internals of Windows. The software license, AAEON hardware and DCI cable are available here:  asset-intertech.com/products/sourc…

0xHex reposted

Video walkthrough of Mandiant's #Flareon10 Yoda challenge: youtu.be/r_ZSqbkFSsc - Full CTF logic explained - Dealing with instruction shuffling and chunked functions - Dealing with obfuscated API calls - Reverse engineering and decompiling ROP chains into regular functions -…

allthingsida's tweet card. Y0da CTF challenge #flareon10 - Full walkthrough + Techniques

youtube.com

YouTube

Y0da CTF challenge #flareon10 - Full walkthrough + Techniques


0xHex reposted

Sharing our extended 2h talk "A Practical Approach to Advanced Code #Obfuscation with #MBA Expressions" from last year's @HITBSecConf Singapore. 📹 Recording: youtube.com/watch?v=5yDzbF… 📚 Slides, code and demos: github.com/arnaugamez/tal…

FuraLabs's tweet card. #HITB2022SIN #LAB Advanced Code Obfuscation With MBA Expressions -...

youtube.com

YouTube

#HITB2022SIN #LAB Advanced Code Obfuscation With MBA Expressions -...


0xHex reposted

Almost ready for production: WinDbg integration with SourcePoint JTAG-based debugging and Intel Processor Trace, Architectural Event Trace (AET), etc.

AlanSguigna's tweet image. Almost ready for production: WinDbg integration with SourcePoint JTAG-based debugging and Intel Processor Trace, Architectural Event Trace (AET), etc.

0xHex reposted

This is part 3 of our Fuzzing Farm series. Our team is also working on 1-day and 0-day exploits. In this article, we explain the process of developing a Proof of Concept (PoC) for undisclosed bugs, using a CVE of Google Chrome as an example. ricercasecurity.blogspot.com/2023/07/fuzzin…


0xHex reposted

🎮PS5 enthusiasts! Specter's talk is here! ⚡Specter @SpecterDev presented the evolving attack surface, modern mitigations like Supervisor Mode Access Prevention (SMAP) etc + internal workings of the PS5's hypervisor ▶️youtu.be/HBFDjfmIUis #hw_ioUSA2023 #gamingconsole

hardwear_io's tweet card. Next-Gen Exploitation: Exploring The PS5 Security Landscape by...

youtube.com

YouTube

Next-Gen Exploitation: Exploring The PS5 Security Landscape by...


0xHex reposted

@hfiref0x strikes again! WubbabooMark aimed to detect traces of usage of software debuggers or special software designed to hide debuggers presence from debugee by tampering various aspects of program environment. github.com/hfiref0x/Wubba…

therealdreg's tweet image. @hfiref0x strikes again! WubbabooMark aimed to detect traces of usage of software debuggers or special software designed to hide debuggers presence from debugee by tampering various aspects of program environment.

github.com/hfiref0x/Wubba…

0xHex reposted

Having this amzn.to/3JQo7Oo board and 4 of M.2 bifurcation adapters you can make 8 channel radio array with uSDR!

wvlt_lab's tweet image. Having this amzn.to/3JQo7Oo board and 4 of M.2 bifurcation adapters you can make 8 channel radio array with uSDR!

0xHex reposted

Flattening ASTs (and Other Compiler Data Structures) cs.cornell.edu/~asampson/blog…

matt_dz's tweet image. Flattening ASTs (and Other Compiler Data Structures)
cs.cornell.edu/~asampson/blog…

0xHex reposted

New updates on Platbox (github.com/IOActive/Platb…): - Code refactored into an easy to use lib - New features to interact with the SPI controller - New checks over the SPI locks - Fixed some bugs Stay tuned for upcoming vuln writeups! @IoaLabs @IOActive @droogie1xp @exminium

github.com

GitHub - IOActive/Platbox: UEFI and SMM Assessment Tool

UEFI and SMM Assessment Tool. Contribute to IOActive/Platbox development by creating an account on GitHub.


0xHex reposted

Our team has done significant work in MS-RPC, and we'd love for other security researchers to as well. We built a tool to analyze RPC Interfaces to aid in looking for vulns and interesting areas in general. Can't wait to see what you find 👀 Write-up: akamai.com/blog/security-…

akamai_research's tweet image. Our team has done significant work in MS-RPC, and we'd love for other security researchers to as well.

We built a tool to analyze RPC Interfaces to aid in looking for vulns and interesting areas in general. 

Can't wait to see what you find 👀

Write-up:
akamai.com/blog/security-…

0xHex reposted

A friend wrote an awesome post about PCIe and how physical memory works. Recommend checking it out, it's very accessible and goes into things that are typically difficult to get solid info about. ctf.re/windows/kernel…


0xHex reposted

Defeating VMProtect’s Latest Tricks cyber.wtf/2023/02/09/def…


0xHex reposted

Very well written #Windows #patchdiffing and #nday #exploitation walkthrough ✊ Dissecting and Exploiting TCP/IP RCE #Vulnerability EvilESP (CVE-2022-34718) // by Valentina Palmiotti securityintelligence.com/posts/dissecti…

0xdea's tweet image. Very well written #Windows #patchdiffing and #nday #exploitation walkthrough ✊ 

Dissecting and Exploiting TCP/IP RCE #Vulnerability EvilESP (CVE-2022-34718)

// by Valentina Palmiotti

securityintelligence.com/posts/dissecti…
0xdea's tweet image. Very well written #Windows #patchdiffing and #nday #exploitation walkthrough ✊ 

Dissecting and Exploiting TCP/IP RCE #Vulnerability EvilESP (CVE-2022-34718)

// by Valentina Palmiotti

securityintelligence.com/posts/dissecti…
0xdea's tweet image. Very well written #Windows #patchdiffing and #nday #exploitation walkthrough ✊ 

Dissecting and Exploiting TCP/IP RCE #Vulnerability EvilESP (CVE-2022-34718)

// by Valentina Palmiotti

securityintelligence.com/posts/dissecti…
0xdea's tweet image. Very well written #Windows #patchdiffing and #nday #exploitation walkthrough ✊ 

Dissecting and Exploiting TCP/IP RCE #Vulnerability EvilESP (CVE-2022-34718)

// by Valentina Palmiotti

securityintelligence.com/posts/dissecti…

0xHex reposted

Our new decompiler plugin is now available! gooMBA is here to help when you’re struggling with a ‘'mixed boolean arithmetic”-obfuscated binary. Read more 🌐 hex-rays.com/blog/deobfusca… #HexRays #HexRaysDecompiler #IDAPro

HexRaysSA's tweet image. Our new decompiler plugin is now available! gooMBA is here to help when you’re struggling with a ‘'mixed boolean arithmetic”-obfuscated binary. Read more 🌐 hex-rays.com/blog/deobfusca…

#HexRays #HexRaysDecompiler #IDAPro

0xHex reposted

New blog post and updated #binaryninja plugin: "Statistical Analysis to Detect Uncommon Code" We use statistics to identify obfuscation in an #Anticheat, a mobile DRM, a #Windows kernel module & malware. Link: synthesis.to/2023/01/26/unc… Code: github.com/mrphrazer/obfu…

mr_phrazer's tweet image. New blog post and updated #binaryninja plugin: "Statistical Analysis to Detect Uncommon Code" We use statistics to identify obfuscation in an #Anticheat, a mobile DRM, a #Windows kernel module & malware.

Link: synthesis.to/2023/01/26/unc…

Code: github.com/mrphrazer/obfu…

0xHex reposted

Kinda sick of these vulnerable drivers: Inglourious Drivers – A Journey of Finding Vulnerabilities in Drivers cyberark.com/resources/thre…


0xHex reposted

StealthHook - A method for hooking functions without modifying memory protection. This tool automatically discovers writable global pointers/vtable entries that are nested within the target function, enabling stealthy function hooking and interception. x86matthew.com/view_post?id=s…

x86matthew's tweet image. StealthHook - A method for hooking functions without modifying memory protection.

This tool automatically discovers writable global pointers/vtable entries that are nested within the target function, enabling stealthy function hooking and interception.

x86matthew.com/view_post?id=s…

0xHex reposted

I'll be doing a webinar on Thursday, Dec. 15th at 10:30am CT on advanced SourcePoint tricks. Things you never knew you could do with the command language: attendee.gotowebinar.com/register/84453…

AlanSguigna's tweet image. I'll be doing a webinar on Thursday, Dec. 15th at 10:30am CT on advanced SourcePoint tricks. Things you never knew you could do with the command language: attendee.gotowebinar.com/register/84453…

Loading...

Something went wrong.


Something went wrong.