https://int0xcc.svbtle.com/using-concolic-execution-for-static-analysis-of-malware #re #malware #dukeBarman
Raashid Bhat on Svbtle
Using concolic execution for static analysis of malware
Reverse engineering is about reducing the complex equation of binary code into na abstract understandable form . Dynamic and static analysis can speed up the process to a large extent , but they have their limitations when malware further tries to...
Wow! Now we have 1k followers! Many thanks to everyone who subscribed to us!
Continue sharing our channel with your friends and we promise to post new links about reverse engineering and exploit development more often! #reverse
Continue sharing our channel with your friends and we promise to post new links about reverse engineering and exploit development more often! #reverse
radare2 has been accepted for GSoC 2018, you can read abour proposed tasks and figure out how to apply as a student here http://radare.org/gsoc/2018/ #reverse #radare2
Script to parse the content of many antivirus quarantine file-format http://hexacorn.com/d/DeXRAY.pl #malware #reverse #dukeBarman
Открыта регистрация на индивидуальный CTF NeoQUEST-2018: https://neoquest.ru/2018/ #ctf
Towards Generic Deobfuscation of Windows API Calls https://arxiv.org/pdf/1802.04466.pdf #reverse #dukeBarman
17-18 Feb. 2018 conference "DC7831 0x08" by @defcon_nn Online stream: https://www.youtube.com/DEFCONNN Details: http://defcon-nn.ru #conference #video
Pin 3.6 released with support for Windows 10 Fall Creators update https://software.intel.com/en-us/articles/pin-a-binary-instrumentation-tool-downloads #pin #dukeBarman
Intel
Pin - A Dynamic Binary Instrumentation Tool
Pin is a dynamic binary instrumentation framework for the IA-32, x86-64 and MIC instruction-set architectures that enables the creation of dynamic program analysis tools.
Google ChromeOS Printer Zeroconf Remote Code Execution Vulnerability (CVE-2017-15400) https://bugs.chromium.org/p/chromium/issues/detail?id=777215 #rce #expdev #darw1n