radare2 has been accepted for GSoC 2018, you can read abour proposed tasks and figure out how to apply as a student here http://radare.org/gsoc/2018/ #reverse #radare2
Script to parse the content of many antivirus quarantine file-format http://hexacorn.com/d/DeXRAY.pl #malware #reverse #dukeBarman
Открыта регистрация на индивидуальный CTF NeoQUEST-2018: https://neoquest.ru/2018/ #ctf
Towards Generic Deobfuscation of Windows API Calls https://arxiv.org/pdf/1802.04466.pdf #reverse #dukeBarman
17-18 Feb. 2018 conference "DC7831 0x08" by @defcon_nn Online stream: https://www.youtube.com/DEFCONNN Details: http://defcon-nn.ru #conference #video
Pin 3.6 released with support for Windows 10 Fall Creators update https://software.intel.com/en-us/articles/pin-a-binary-instrumentation-tool-downloads #pin #dukeBarman
Intel
Pin - A Dynamic Binary Instrumentation Tool
Pin is a dynamic binary instrumentation framework for the IA-32, x86-64 and MIC instruction-set architectures that enables the creation of dynamic program analysis tools.
Google ChromeOS Printer Zeroconf Remote Code Execution Vulnerability (CVE-2017-15400) https://bugs.chromium.org/p/chromium/issues/detail?id=777215 #rce #expdev #darw1n
Remote Code Execution in IDA by double clicking a string. Protocol handler abuse. http://riscy.business/2018/02/ida-remote-execution/ #darw1n
NowSecure webinar: The Latest on R2 and FRIDA https://www.brighttalk.com/webcast/15139/304637 #radare2 #frida #dukeBarman
Intel released "Retpoline: A Branch Target Injection Mitigation" https://software.intel.com/sites/default/files/managed/1d/46/Retpoline-A-Branch-Target-Injection-Mitigation.pdf #dukeBarman