By combining Frida with an enhanced version of Tenet, Frinet facilitates the study of large programs, vulnerability research and root-cause analysis on iOS, Android, Windows and most architectures.
https://www.synacktiv.com/publications/frinet-reverse-engineering-made-easier
https://www.synacktiv.com/publications/frinet-reverse-engineering-made-easier
Synacktiv
Frinet: reverse-engineering made easier
Writing a decent win32 keylogger [1/3]
https://www.synacktiv.com/publications/writing-a-decent-win32-keylogger-13
https://www.synacktiv.com/publications/writing-a-decent-win32-keylogger-13
Synacktiv
Writing a decent win32 keylogger [1/3]
Blue Galaxy Energy: a new White-box Cryptanalysis Open Source Tool
https://blog.quarkslab.com/blue-galaxy-energy-a-new-white-box-cryptanalysis-open-source-tool.html
https://blog.quarkslab.com/blue-galaxy-energy-a-new-white-box-cryptanalysis-open-source-tool.html
Quarkslab
Blue Galaxy Energy: a new White-box Cryptanalysis Open Source Tool - Quarkslab's blog
We introduce a new white-box cryptanalysis tool based on the pioneering BGE paper but without known open source public implementation so far.
Ghidriff: Ghidra Binary Diffing Engine
https://clearbluejar.github.io/posts/ghidriff-ghidra-binary-diffing-engine/
https://clearbluejar.github.io/posts/ghidriff-ghidra-binary-diffing-engine/
clearbluejar
Ghidriff: Ghidra Binary Diffing Engine
As seen in most security blog posts today, binary diffing tools are essential for reverse engineering, vulnerability research, and malware analysis. Patch diffing is a technique widely used to identify changes across versions of binaries as related to security…
Сегодня ровно 4 года, как я перестал употреблять алкоголь 🎃 а завтра будет ровно 1 год, как бросил курить 🥶
https://secret.club/2023/12/24/riscy-business.html
RISC-Y Business: Raging against the reduced machine
RISC-Y Business: Raging against the reduced machine
secret club
RISC-Y Business: Raging against the reduced machine
Abstract In recent years the interest in obfuscation has increased, mainly because people want to protect their intellectual property. Unfortunately, most of what’s been written is focused on the theoretical aspects. In this article, we will discuss the practical…
Order of Six Angles
я чуть не охуел дебаггер сам взял сменил себе иконки на новогодние
merry christmas! ебать время летит
Order of Six Angles
*чуть обновил https://www.orderofsixangles.com/art
пришла физическая копия моего нфт 🤯
This media is not supported in your browser
VIEW IN TELEGRAM
Коротко о моей ленте твиттера: 99% коты, 1% иб
Operation Triangulation:
What You Get When Attack iPhones of Researchers
https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers#t=1965
What You Get When Attack iPhones of Researchers
https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers#t=1965
media.ccc.de
Operation Triangulation
Imagine discovering a zero-click attack targeting Apple mobile devices of your colleagues and managing to capture all the stages of the a...
Order of Six Angles
Operation Triangulation: What You Get When Attack iPhones of Researchers https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers#t=1965
X (formerly Twitter)
Boris Larin (@oct0xor) on X
Thanks to marcan (https://t.co/sDwlE7Wq6T) and @zhuowei (https://t.co/EzBvk4cNBY) now we know the original purpose for this unknown hardware feature. Its MMIO debug registers for GPU L2 cache. I am really excited that we are very close to solving this mystery!
Order of Six Angles
https://x.com/oct0xor/status/1740543898022547780?t=pf-q9JPpQbqzllx_qwLTeQ&s=35
по слухам, генерал цру лично позвонил тиму куку и попросил адреса дебаг регистров (шутка)