Forwarded from Mir Saman Tajbakhsh
📀 Santoku Linux for mobile security researchers.
* Mobile Malware Analysis
* Mobile Forensics
* Mobile Security Testing
More info and download:
https://santoku-linux.com
* Mobile Malware Analysis
* Mobile Forensics
* Mobile Security Testing
More info and download:
https://santoku-linux.com
HackerOne
http://martin.uy/blog/projects/reverse-engineering/
Reverse Engineering open course! This course is a journey into executable binaries and operating systems from 3 different angles:
1) Malware analysis
2) Bug hunting
3) Exploit writing
Both Windows and Linux x86/x86_64 platforms are under scope.
1) Malware analysis
2) Bug hunting
3) Exploit writing
Both Windows and Linux x86/x86_64 platforms are under scope.
Android Applications Reversing 101
https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/
https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/
evilsocket
Android Applications Reversing 101
Every day we see a bunch of new Android applications being published on the Google Play Store, from games, to utilities, to IoT devices clients and so forth, al
FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerable devices and they are showed on the map for analysis. All data updated in Firebase are Realtime.
https://github.com/Warflop/FireShodanMap
https://github.com/Warflop/FireShodanMap
GitHub
GitHub - Warflop/FireShodanMap: FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried…
FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerable devices and they are showed on the map for analysis. All ...
ret2libc without function calls (x86)
https://hovav.net/ucsd/dist/geometry.pdf
https://hovav.net/ucsd/dist/geometry.pdf
Forwarded from Rayanfam (Sina)
Blog post about anti-anti-vm techniques 😊
https://rayanfam.com/topics/defeating-malware-anti-vm-techniques-cpuid-based-instructions/
https://rayanfam.com/topics/defeating-malware-anti-vm-techniques-cpuid-based-instructions/
Rayanfam Blog
Defeating malware’s Anti-VM techniques (CPUID-Based Instructions)
We write about Windows Internals, Hypervisors, Linux, and Networks.
New 'Lazy FP State Restore' Vulnerability Found in All Modern Intel CPUs
https://thehackernews.com/2018/06/intel-processor-vulnerability.html
https://thehackernews.com/2018/06/intel-processor-vulnerability.html
The Hacker News
New 'Lazy FP State Restore' Vulnerability Found in All Modern Intel CPUs
New 'Lazy FP State Restore' vulnerability (CVE-2018-3665) has been discovered in Sandy Bridge and newer Intel processors
Proposed Security Patch: Replacement of use of SHA-1 in the SRP Client Proof with SHA-256
http://tracker.firebirdsql.org/browse/CORE-5788
http://tracker.firebirdsql.org/browse/CORE-5788