r0 Crew (Channel)
8.72K subscribers
35 photos
1 video
9 files
1.98K links
Security Related Links:
- Reverse Engineering;
- Malware Research;
- Exploit Development;
- Pentest;
- etc;

Join to chat: @r0crew_bot 👈

Forum: https://forum.reverse4you.org
Twitter: https://twitter.com/R0_Crew
Download Telegram
Wow! Now we have 1k followers! Many thanks to everyone who subscribed to us!

Continue sharing our channel with your friends and we promise to post new links about reverse engineering and exploit development more often! #reverse
radare2 has been accepted for GSoC 2018, you can read abour proposed tasks and figure out how to apply as a student here http://radare.org/gsoc/2018/ #reverse #radare2
Script to parse the content of many antivirus quarantine file-format http://hexacorn.com/d/DeXRAY.pl #malware #reverse #dukeBarman
Открыта регистрация на индивидуальный CTF NeoQUEST-2018: https://neoquest.ru/2018/ #ctf
Towards Generic Deobfuscation of Windows API Calls https://arxiv.org/pdf/1802.04466.pdf #reverse #dukeBarman
17-18 Feb. 2018 conference "DC7831 0x08" by @defcon_nn Online stream: https://www.youtube.com/DEFCONNN Details: http://defcon-nn.ru #conference #video
Google ChromeOS Printer Zeroconf Remote Code Execution Vulnerability (CVE-2017-15400) https://bugs.chromium.org/p/chromium/issues/detail?id=777215 #rce #expdev #darw1n
Remote Code Execution in IDA by double clicking a string. Protocol handler abuse. http://riscy.business/2018/02/ida-remote-execution/ #darw1n
NowSecure webinar: The Latest on R2 and FRIDA https://www.brighttalk.com/webcast/15139/304637 #radare2 #frida #dukeBarman