You might like
Our Online Store is now live. Individual researchers and hobbyists can now purchase our Intel JTAG debugger, and debug the undebuggable internals of Windows. The software license, AAEON hardware and DCI cable are available here: asset-intertech.com/products/sourc…
Video walkthrough of Mandiant's #Flareon10 Yoda challenge: youtu.be/r_ZSqbkFSsc - Full CTF logic explained - Dealing with instruction shuffling and chunked functions - Dealing with obfuscated API calls - Reverse engineering and decompiling ROP chains into regular functions -…
youtube.com
YouTube
Y0da CTF challenge #flareon10 - Full walkthrough + Techniques
Sharing our extended 2h talk "A Practical Approach to Advanced Code #Obfuscation with #MBA Expressions" from last year's @HITBSecConf Singapore. 📹 Recording: youtube.com/watch?v=5yDzbF… 📚 Slides, code and demos: github.com/arnaugamez/tal…
youtube.com
YouTube
#HITB2022SIN #LAB Advanced Code Obfuscation With MBA Expressions -...
Almost ready for production: WinDbg integration with SourcePoint JTAG-based debugging and Intel Processor Trace, Architectural Event Trace (AET), etc.
This is part 3 of our Fuzzing Farm series. Our team is also working on 1-day and 0-day exploits. In this article, we explain the process of developing a Proof of Concept (PoC) for undisclosed bugs, using a CVE of Google Chrome as an example. ricercasecurity.blogspot.com/2023/07/fuzzin…
🎮PS5 enthusiasts! Specter's talk is here! ⚡Specter @SpecterDev presented the evolving attack surface, modern mitigations like Supervisor Mode Access Prevention (SMAP) etc + internal workings of the PS5's hypervisor ▶️youtu.be/HBFDjfmIUis #hw_ioUSA2023 #gamingconsole
youtube.com
YouTube
Next-Gen Exploitation: Exploring The PS5 Security Landscape by...
@hfiref0x strikes again! WubbabooMark aimed to detect traces of usage of software debuggers or special software designed to hide debuggers presence from debugee by tampering various aspects of program environment. github.com/hfiref0x/Wubba…
Having this amzn.to/3JQo7Oo board and 4 of M.2 bifurcation adapters you can make 8 channel radio array with uSDR!
Flattening ASTs (and Other Compiler Data Structures) cs.cornell.edu/~asampson/blog…
New updates on Platbox (github.com/IOActive/Platb…): - Code refactored into an easy to use lib - New features to interact with the SPI controller - New checks over the SPI locks - Fixed some bugs Stay tuned for upcoming vuln writeups! @IoaLabs @IOActive @droogie1xp @exminium
github.com
GitHub - IOActive/Platbox: UEFI and SMM Assessment Tool
UEFI and SMM Assessment Tool. Contribute to IOActive/Platbox development by creating an account on GitHub.
Our team has done significant work in MS-RPC, and we'd love for other security researchers to as well. We built a tool to analyze RPC Interfaces to aid in looking for vulns and interesting areas in general. Can't wait to see what you find 👀 Write-up: akamai.com/blog/security-…
A friend wrote an awesome post about PCIe and how physical memory works. Recommend checking it out, it's very accessible and goes into things that are typically difficult to get solid info about. ctf.re/windows/kernel…
Upcoming Public Training Classes for April/May scorpiosoftware.net/2023/02/17/upc…
scorpiosoftware.net
Upcoming Public Training Classes for April/May
Today I’m happy to announce two training classes to take place in April and May. These classes will be in 4-hour session chunks, so that it’s easier to consume even for uncomfortable ti…
Very well written #Windows #patchdiffing and #nday #exploitation walkthrough ✊ Dissecting and Exploiting TCP/IP RCE #Vulnerability EvilESP (CVE-2022-34718) // by Valentina Palmiotti securityintelligence.com/posts/dissecti…
Our new decompiler plugin is now available! gooMBA is here to help when you’re struggling with a ‘'mixed boolean arithmetic”-obfuscated binary. Read more 🌐 hex-rays.com/blog/deobfusca… #HexRays #HexRaysDecompiler #IDAPro
New blog post and updated #binaryninja plugin: "Statistical Analysis to Detect Uncommon Code" We use statistics to identify obfuscation in an #Anticheat, a mobile DRM, a #Windows kernel module & malware. Link: synthesis.to/2023/01/26/unc… Code: github.com/mrphrazer/obfu…
Kinda sick of these vulnerable drivers: Inglourious Drivers – A Journey of Finding Vulnerabilities in Drivers cyberark.com/resources/thre…
StealthHook - A method for hooking functions without modifying memory protection. This tool automatically discovers writable global pointers/vtable entries that are nested within the target function, enabling stealthy function hooking and interception. x86matthew.com/view_post?id=s…
I'll be doing a webinar on Thursday, Dec. 15th at 10:30am CT on advanced SourcePoint tricks. Things you never knew you could do with the command language: attendee.gotowebinar.com/register/84453…
United States Trends
- 1. Northern Lights 36.3K posts
- 2. #DWTS 50K posts
- 3. #Aurora 7,473 posts
- 4. Justin Edwards 2,055 posts
- 5. Louisville 17.2K posts
- 6. #RHOSLC 6,361 posts
- 7. Creighton 1,991 posts
- 8. #OlandriaxHarpersBazaar 4,622 posts
- 9. Andy 60.7K posts
- 10. Gonzaga 2,634 posts
- 11. Lowe 12.5K posts
- 12. #GoAvsGo 1,432 posts
- 13. Oweh 2,038 posts
- 14. JT Toppin N/A
- 15. Kentucky 25.4K posts
- 16. Celtics 12.2K posts
- 17. Elaine 40.9K posts
- 18. Robert 100K posts
- 19. Dylan 31.1K posts
- 20. Go Cards 2,742 posts
Something went wrong.
Something went wrong.