Reverse Engineering the Win32k Type Isolation Mitigation https://blog.quarkslab.com/reverse-engineering-the-win32k-type-isolation-mitigation.html #links #exploit
Make yara-rules into r2 https://twitter.com/cmatthewbrooks/status/961566140886495233 #radare2 #yara #dukeBarman
https://int0xcc.svbtle.com/using-concolic-execution-for-static-analysis-of-malware #re #malware #dukeBarman
Raashid Bhat on Svbtle
Using concolic execution for static analysis of malware
Reverse engineering is about reducing the complex equation of binary code into na abstract understandable form . Dynamic and static analysis can speed up the process to a large extent , but they have their limitations when malware further tries to...
Wow! Now we have 1k followers! Many thanks to everyone who subscribed to us!
Continue sharing our channel with your friends and we promise to post new links about reverse engineering and exploit development more often! #reverse
Continue sharing our channel with your friends and we promise to post new links about reverse engineering and exploit development more often! #reverse
radare2 has been accepted for GSoC 2018, you can read abour proposed tasks and figure out how to apply as a student here http://radare.org/gsoc/2018/ #reverse #radare2
Script to parse the content of many antivirus quarantine file-format http://hexacorn.com/d/DeXRAY.pl #malware #reverse #dukeBarman
Открыта регистрация на индивидуальный CTF NeoQUEST-2018: https://neoquest.ru/2018/ #ctf
Towards Generic Deobfuscation of Windows API Calls https://arxiv.org/pdf/1802.04466.pdf #reverse #dukeBarman
17-18 Feb. 2018 conference "DC7831 0x08" by @defcon_nn Online stream: https://www.youtube.com/DEFCONNN Details: http://defcon-nn.ru #conference #video