Keylogging in the Windows kernel with undocumented data structures
https://eversinc33.com/posts/kernel-mode-keylogging/
https://eversinc33.com/posts/kernel-mode-keylogging/
SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem
https://www.ndss-symposium.org/wp-content/uploads/2024-926-paper.pdf
https://www.ndss-symposium.org/wp-content/uploads/2024-926-paper.pdf
Unveiling custom packers: A comprehensive guide
https://estr3llas.github.io/unveiling-custom-packers-a-comprehensive-guide/
https://estr3llas.github.io/unveiling-custom-packers-a-comprehensive-guide/
Estrellas’s Blog
Unveiling custom packers: A comprehensive guide
In this article, you'll be diving into an introduction to how packers work, some tips to unpack, and two walkthroughs showing off how i usually deal with custom packers.
Automating Qakbot Malware Analysis with Binary Ninja
https://invokere.com/posts/2024/02/automating-qakbot-malware-analysis-with-binary-ninja/
https://invokere.com/posts/2024/02/automating-qakbot-malware-analysis-with-binary-ninja/
Invokere
Automating Qakbot Malware Analysis with Binary Ninja
Throughout this blog post we provide Binary Ninja automation strategies for analyzing obfuscation techniques implemented by Qakbot.
This media is not supported in your browser
VIEW IN TELEGRAM
Когда накопил денег на IDA PRO
Static Analysis Automation for Hunting Vulnerable Kernel Drivers
https://speakerdeck.com/takahiro_haruyama/static-analysis-automation-for-hunting-vulnerable-kernel-drivers
https://speakerdeck.com/takahiro_haruyama/static-analysis-automation-for-hunting-vulnerable-kernel-drivers
Speaker Deck
Static Analysis Automation for Hunting Vulnerable Kernel Drivers
https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html
https://github.com/TakahiroHaruyama/VDR
Microsoft Windows allows lo…
https://github.com/TakahiroHaruyama/VDR
Microsoft Windows allows lo…
Analysing Windows Malware on Apple Mac M1/M2 ( Windows 11 ARM ) - Part I
x86/x64 emulation internals on Windows 11 ARM
https://int0xcc.svbtle.com/apple-m2-or-windows-arm-for-malware-analysis
x86/x64 emulation internals on Windows 11 ARM
https://int0xcc.svbtle.com/apple-m2-or-windows-arm-for-malware-analysis
Raashid Bhat on Svbtle
Analysing Windows Malware on Apple Mac M1/M2 ( Windows 11 ARM )...
x86/x64 emulation internals on Windows 11 ARM # Introduction # Since the introduction of Intel processors for the MacBooks, malware analysis on Mac has become quite popular, and it has become the hardware of choice for malware analysts. With the...
About Rust symbol recovery: a journey into reversing Krustyloader
https://nofix.re/posts/2024-11-02-rust-symbs/?_=0
https://nofix.re/posts/2024-11-02-rust-symbs/?_=0
nofix.re
KrustyLoader - About stripped Rust symbol recovery
About Rust symbol recovery: a journey into reversing Krustyloader, a rust-based dropper targeting Invanti
Trusted Computing 1101: Introductory Trusted Platform Module (TPM) usage
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+TC1101_IntroTPM+2024_v1/about
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+TC1101_IntroTPM+2024_v1/about
p.ost2.fyi
Trusted Computing 1101: Introductory Trusted Platform Module (TPM) usage
Learning how to use Trusted Platform Modules (TPMs)
GhostRace: Exploiting and Mitigating Speculative Race Conditions
https://download.vusec.net/papers/ghostrace_sec24.pdf
https://download.vusec.net/papers/ghostrace_sec24.pdf