Diving into ADB protocol internals
https://www.synacktiv.com/publications/diving-into-adb-protocol-internals-12
https://www.synacktiv.com/publications/diving-into-adb-protocol-internals-12
Synacktiv
Diving into ADB protocol internals (1/2)
Detecting Domain Names Generated by DGAs With Low False Positives in Chinese Domain Names
https://ieeexplore.ieee.org/ielx8/6287639/10380310/10664539.pdf
https://ieeexplore.ieee.org/ielx8/6287639/10380310/10664539.pdf
Fuzzing from First Principles with Alisa Esage
https://x.com/i/broadcasts/1kvJpbldXraKE
Слайды:
https://zerodayengineering.com/research/slides/FuzzingFromFirstPrinciples.pdf
P.S Оказывается есть и на ютубе
https://www.youtube.com/watch?v=9U-FK_Qi1XQ
https://x.com/i/broadcasts/1kvJpbldXraKE
Слайды:
https://zerodayengineering.com/research/slides/FuzzingFromFirstPrinciples.pdf
P.S Оказывается есть и на ютубе
https://www.youtube.com/watch?v=9U-FK_Qi1XQ
Apple Gatekeeper Bypass
Two ways we can use to deliver malware on macOS silently
https://karol-mazurek.medium.com/apple-gatekeeper-bypass-4315bbb33018
Two ways we can use to deliver malware on macOS silently
https://karol-mazurek.medium.com/apple-gatekeeper-bypass-4315bbb33018
Medium
Apple Gatekeeper Bypass
Two ways we can use to deliver malware on macOS silently
The real slim shady || Ivanti Endpoint Manager (EPM) Pre-Auth RCE
CVE-2024-29847
https://summoning.team/blog/ivanti-epm-cve-2024-29847-deserialization-rce/
CVE-2024-29847
https://summoning.team/blog/ivanti-epm-cve-2024-29847-deserialization-rce/
Summoning Team
The real slim shady || Ivanti Endpoint Manager (EPM) Pre-Auth RCE
ivanti just pushed a patch for a Critical CVSS 9.8 Remote Code Execution Vulnerability that I reported on May 1st 2024, impacting Ivanti Endpoint Manager (EPM). in the following blog post I will be publishing the fully working unauthenticated exploit and…
Пью кофе каждый день, решил сделать перерыв в два дня. А вы делаете специально перерывы в употреблении кофе?
Anonymous Poll
42%
Да
58%
Нет
document the process of reverse engineering and devirtualising a binary protected with virtualisation obfuscation and various anti-debugging techniques
https://blog.deobfuscate.io/reversing-vmcrack
https://blog.deobfuscate.io/reversing-vmcrack
Reverse Engineering Blog
Reversing VMCrack
Reverse engineering a binary obfuscated with virtual machine obfuscation. The challenge is vmcrack from Hack The Box.
Binary Ninja plugin for extracting files from container formats
https://github.com/Vector35/blob_extractor
https://github.com/Vector35/blob_extractor
GitHub
GitHub - Vector35/blob_extractor: Identify and extract files from container formats using unblob.
Identify and extract files from container formats using unblob. - Vector35/blob_extractor
NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-build support
https://github.com/BlackSnufkin/NyxInvoke
https://github.com/BlackSnufkin/NyxInvoke
GitHub
GitHub - BlackSnufkin/NyxInvoke: NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless…
NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-build support - BlackSnufkin/NyxInvoke
Using AI-assisted decompilation of Radare2
https://cryptax.medium.com/using-ai-assisted-decompilation-of-radare2-e81a882863c9
https://cryptax.medium.com/using-ai-assisted-decompilation-of-radare2-e81a882863c9
Medium
Using AI-assisted decompilation of Radare2
A few months ago, Radare2 (aka r2), an open source disassembler which can be entirely used by command line, started implementing AI plugins…