We have a music channel. Perhaps it will be interesting to someone? https://t.me/R0_Music
Cutter 1.2 and radare2 2.3.0 (Codename: DirtyHarry) are out
- https://github.com/radare/radare2/releases/tag/2.3.0
- https://github.com/radareorg/cutter/releases/tag/v1.2
#radare2 #reverse
- https://github.com/radare/radare2/releases/tag/2.3.0
- https://github.com/radareorg/cutter/releases/tag/v1.2
#radare2 #reverse
GitHub
Release Codename: DirtyHarry · radareorg/radare2
Builds: http://radare.mikelloc.com/get/2.3.0/
Changelog:
Release 2.3.0 - use latest acr 1.4
Analysis:
Better use of search.in and anal.in and zoom.in - sivaramaa
Initial work on CPU specific regis...
Changelog:
Release 2.3.0 - use latest acr 1.4
Analysis:
Better use of search.in and anal.in and zoom.in - sivaramaa
Initial work on CPU specific regis...
Windows Drivers fuzzer https://twitter.com/KeyZ3r0/status/958924764336201728 #exploit #windows #dukeBarman
Twitter
K0shl
I opened my Windows Driver Fuzzer--kDrvier Fuzzer in github based on ioctlbf framework, I gained approach 100 CVEs by kDriver Fuzzer in last 3 month!😀😀 And I wrote my kDriver Fuzzer tech. detail in Chinese😁 https://t.co/bT32kB3SjV
https://github.com/Coalfire-Research/iOS-11.1.2-15B202-Jailbreak/blob/master/iOS_jailbreak_writeup.pdf #jailbreak #ios #exploit #dukeBarman
GitHub
iOS-11.1.2-15B202-Jailbreak/iOS_jailbreak_writeup.pdf at main · Coalfire-Research/iOS-11.1.2-15B202-Jailbreak
iOS 11.1.2 (15B202) Jailbreak. Contribute to Coalfire-Research/iOS-11.1.2-15B202-Jailbreak development by creating an account on GitHub.
Hexrays upgraded free IDA from v5 to v7 (supports only x64 code) https://www.hex-rays.com/products/ida/support/download_freeware.shtml #re #dukeBarman
Hex-Rays
IDA Free: Disassembler & Decompiler at No Cost
Free disassembler and decompiler to learn reverse engineering. Core IDA features at no cost for students and non-commercial use. Download and start today.
Decompiler internals: microcode (IDA IR) https://www.hex-rays.com/products/ida/support/ppt/recon2018.ppt #re #ida #ir #dukeBarman
Reverse Engineering the Win32k Type Isolation Mitigation https://blog.quarkslab.com/reverse-engineering-the-win32k-type-isolation-mitigation.html #links #exploit
Make yara-rules into r2 https://twitter.com/cmatthewbrooks/status/961566140886495233 #radare2 #yara #dukeBarman
https://int0xcc.svbtle.com/using-concolic-execution-for-static-analysis-of-malware #re #malware #dukeBarman
Raashid Bhat on Svbtle
Using concolic execution for static analysis of malware
Reverse engineering is about reducing the complex equation of binary code into na abstract understandable form . Dynamic and static analysis can speed up the process to a large extent , but they have their limitations when malware further tries to...
Wow! Now we have 1k followers! Many thanks to everyone who subscribed to us!
Continue sharing our channel with your friends and we promise to post new links about reverse engineering and exploit development more often! #reverse
Continue sharing our channel with your friends and we promise to post new links about reverse engineering and exploit development more often! #reverse
radare2 has been accepted for GSoC 2018, you can read abour proposed tasks and figure out how to apply as a student here http://radare.org/gsoc/2018/ #reverse #radare2