Forming Faster Firmware Fuzzers
https://download.vusec.net/papers/safirefuzz_sec23.pdf
https://github.com/pr0me/SAFIREFUZZ
https://download.vusec.net/papers/safirefuzz_sec23.pdf
https://github.com/pr0me/SAFIREFUZZ
Beyond the DevTools: Profiling WebApps at the Assembly Level
https://leaningtech.com/beyond-devtools-profiling-webapps-at-the-assembly-level/
https://leaningtech.com/beyond-devtools-profiling-webapps-at-the-assembly-level/
Designing a Malware Loader detector with Guard Violation Exceptions
https://reversing.codes/posts/Detecting-injected-code-with-page-guards/
https://reversing.codes/posts/Detecting-injected-code-with-page-guards/
Reversing codes
Designing a Malware Loader detector with Guard Violation Exceptions
Recently, I made the decision to finally publish my tool focused on unpacking, called Shinigami. The idea for Shinigami came to me two years ago, but I never actually implemented it until now. Initially, it was designed to dump implants injected via process…
The art of fuzzing: Windows Binaries
https://bushido-sec.com/index.php/2023/06/25/the-art-of-fuzzing-windows-binaries/
https://bushido-sec.com/index.php/2023/06/25/the-art-of-fuzzing-windows-binaries/
Bushido Security
The art of fuzzing: Windows Binaries - Bushido Security
This article delves into the concept of grey-box fuzzing, focusing on testing closed-source Windows binaries. Grey-box fuzzing allows vulnerability researchers to discover undiscovered vulnerabilities by fuzzing targets without having access to their source…
The Threat Actor Profile Guide for CTI Analysts
https://github.com/curated-intel/Threat-Actor-Profile-Guide
https://github.com/curated-intel/Threat-Actor-Profile-Guide
GitHub
GitHub - curated-intel/Threat-Actor-Profile-Guide: The Threat Actor Profile Guide for CTI Analysts
The Threat Actor Profile Guide for CTI Analysts. Contribute to curated-intel/Threat-Actor-Profile-Guide development by creating an account on GitHub.
Order of Six Angles
карент муд
Повторение опроса. Текущий настрой на жизнь
Final Results
52%
хочется нихуя не делать
48%
еще есть силы
Forwarded from RME-DisCo @ UNIZAR [www.reversea.me]
Using PANDA to search for F.L.I.R.T. signatures during process execution https://blog.nietaanraken.nl/posts/pandare-flirt/
Blog by Joren Vrancken
Using PANDA to search for F.L.I.R.T. signatures during process execution
When a malware analyst gets a new malware sample to analyze, one of the first questions they might have, is what functions are called during the execution of the sample. To solve this problem, we can use any old debugger to walk through the sample manually…