You suspect there should be a cross-reference in the listing, but IDA isnโt showing it? See how to find it ๐ https://hex-rays.com/blog/igors-tip-of-the-week-132-finding-hidden-cross-references/?utm_source=Social-Media-Post&utm_medium=Twitter&utm_campaign=Igor-Tip-132
#IgorsTipOfTheWeek #IDAtips #IDAPro
๐ฃHexRaysSA
๐@malwr
#IgorsTipOfTheWeek #IDAtips #IDAPro
๐ฃHexRaysSA
๐@malwr
๐1
As promised earlier today, here is my writeup about a recent #Gozi campaign that was targeting the ๐ฎ๐น audience.
Covering geofence payloads handle, jscript.encode script, shellcodes analysis, APC Injection and much more!
Have fun :)
https://0xtoxin-labs.gitbook.io/malware-analysis/malware-analysis/gozi-italian-shellcode-dance
๐ฃ0xToxin
๐@malwr
Covering geofence payloads handle, jscript.encode script, shellcodes analysis, APC Injection and much more!
Have fun :)
https://0xtoxin-labs.gitbook.io/malware-analysis/malware-analysis/gozi-italian-shellcode-dance
๐ฃ0xToxin
๐@malwr
Nice blog post on using Qiling framework for automatically unpack ELF executables
https://kernemporium.github.io/posts/unpacking/
#qiling #infosec #reverseengineering #learning
๐ฃ0xor0ne
๐@malwr
https://kernemporium.github.io/posts/unpacking/
#qiling #infosec #reverseengineering #learning
๐ฃ0xor0ne
๐@malwr
โค1๐1
Reverse Engineering a Windows 95 Game - Part II: Reversing (Undocumented) Settings : https://sidneys1.com/reverse-engineering/2023/03/16/reverse-engineering-a-win95-game-II.html
Part 1 : https://sidneys1.com/reverse-engineering/2023/02/23/reverse-engineering-a-win95-game-I.html
๐ฃbinitamshah
๐@malwr
Part 1 : https://sidneys1.com/reverse-engineering/2023/02/23/reverse-engineering-a-win95-game-I.html
๐ฃbinitamshah
๐@malwr
Sidneys1.com
Reverse Engineering a Windows 95 Game
I recently rediscovered an obscure 1997 Simon & Schuster / Marshall Media edutainment game for Windows 95 that I played as a kid: Math Invaders. In this part, weโll investigate disassembling and reverse engineering the binary to identify an undocumented settingsโฆ
๐2
Weโve just published a short #IDAPro tutorial about the #Disassembly window. Watch it now ๐ https://youtu.be/cgELfAUg8C4
#IDAProTutorials #IDAPro #hexrays #LearningIDA
๐ฃHexRaysSA
๐@malwr
#IDAProTutorials #IDAPro #hexrays #LearningIDA
๐ฃHexRaysSA
๐@malwr
Android Attack: Reversing React Native Applications
https://securityqueens.co.uk/android-attack-reversing-react-native-applications/
๐ฃpentest_swissky
๐@malwr
https://securityqueens.co.uk/android-attack-reversing-react-native-applications/
๐ฃpentest_swissky
๐@malwr
Python and Malware: Writing a simple wiper malware - Malware - 0x00sec - The Home of the Hacker https://0x00sec.org/t/python-and-malware-writing-a-simple-wiper-malware/31652
๐ฃakaclandestine
๐@malwr
๐ฃakaclandestine
๐@malwr
0x00sec - The Home of the Hacker
Python and Malware: Writing a simple wiper malware
Introduction In this article, Iโll describe how to write a malware, Please notice this is not a โtrueโ malware this is only has to show you the basics and even how easy to be written, Probably python is not the best choice at all, Itโs an interpreted languageโฆ
๐1
Happy to announce the release of my JADX dynamic scripting plugin, JADXecute. Now you write and share scripts to automate your Android APK analysis! #ReverseEngineering
https://github.com/LaurieWired/JADXecute
๐ฃlauriewired
๐@malwr
https://github.com/LaurieWired/JADXecute
๐ฃlauriewired
๐@malwr
Here's a short blog on using Frida to write and bypass detections for your TTPs. We can use good ol' userland hooking + JavaScript bindings to avoid writing complex kernel code, which lets us quickly develop test cases and improve our techniques.
https://passthehashbrowns.github.io/using-frida-for-rapid-detection-testing
๐ฃpassthehashbrwn
๐@malwr
https://passthehashbrowns.github.io/using-frida-for-rapid-detection-testing
๐ฃpassthehashbrwn
๐@malwr
PassTheHashBrowns
Using Frida for rapid detection testing
Using Frida for rapid detection testing When Iโm developing payloads or doing research, I frequently want to test code that Iโve written against common defensive capabilities. Unfortunately, most defensive capabilities are implemented in C/C++ and run inโฆ
Icicle is a multi architecture emulation framework designed for firmware fuzzing.
Very interesting research work
Paper: https://arxiv.org/pdf/2301.13346.pdf
github repo (pre-release): https://github.com/icicle-emu/icicle
#fuzzing #firmware #infosec #cybersecurity
๐ฃ0xor0ne
๐@malwr
Very interesting research work
Paper: https://arxiv.org/pdf/2301.13346.pdf
github repo (pre-release): https://github.com/icicle-emu/icicle
#fuzzing #firmware #infosec #cybersecurity
๐ฃ0xor0ne
๐@malwr
โค1
travisgoodspeed/gbrom-tutorial: Tutorial for extracting the GameBoy ROM from photographs of the die.
๐ฃtnavda
Fascinating read, thanks for sharing.
๐คcea1990
I don't know if I'll ever personally need this info but it was a great read nonetheless!
๐คBrowsing_From_Work
๐@malwr
๐ฃtnavda
Fascinating read, thanks for sharing.
๐คcea1990
I don't know if I'll ever personally need this info but it was a great read nonetheless!
๐คBrowsing_From_Work
๐@malwr
GitHub
GitHub - travisgoodspeed/gbrom-tutorial: Tutorial for extracting the GameBoy ROM from photographs of the die.
Tutorial for extracting the GameBoy ROM from photographs of the die. - travisgoodspeed/gbrom-tutorial
How to Create a Virtual Hacking Lab: The Ultimate Hacker Setup
๐ฃflacao9
Nice article and how I did my approach to learning. Gotta love VirtualBox.
Another approach too for specific service testing is creating a vuln testbed service using docker. It's a lot lighter than a full VM.
๐คFolsgaardSE
This is all manual work, which is fine, but you could use the Red Team Attack Lab or the game of thrones lab
๐คProud-Tap6586
๐@malwr
๐ฃflacao9
Nice article and how I did my approach to learning. Gotta love VirtualBox.
Another approach too for specific service testing is creating a vuln testbed service using docker. It's a lot lighter than a full VM.
๐คFolsgaardSE
This is all manual work, which is fine, but you could use the Red Team Attack Lab or the game of thrones lab
๐คProud-Tap6586
๐@malwr
StationX
How to Create a Virtual Hacking Lab: Ultimate 2026 Setup
We will show you how to create a virtual hacking lab for pentesting at home, from beginner level to advanced.
Analysis of a Redline Based Malware
๐ฃserhack
Why does he look like heโs on team rocket about to lose to pikachu
๐คcanofspam2020
๐@malwr
๐ฃserhack
Why does he look like heโs on team rocket about to lose to pikachu
๐คcanofspam2020
๐@malwr
SerHack โ Security Research
Analysis of a Redline Based Malware โ SerHack Blog
In this article, we explain how we were able to identify a Redline-style malware and how we found out how it worked