Introduction to eBPF for Windows
https://scorpiosoftware.net/2025/02/22/introduction-to-ebpf-for-windows/
https://scorpiosoftware.net/2025/02/22/introduction-to-ebpf-for-windows/
Pavel Yosifovich
Introduction to eBPF for Windows
In the Linux world, the eBPF technology has been around for years. Its purpose is to allow writing programs that run within the Linux kernel. However, contrary to standard kernel modules, eBPF runs…
UEFI Bootkit Hunting- In-Depth Search for Unique Code Behavior (слайды)
https://github.com/binarly-io/Research_Publications/blob/main/REverse_2025/UEFI%20Bootkit%20Hunting-%20In-Depth%20Search%20for%20Unique%20Code%20Behavior.pdf
https://github.com/binarly-io/Research_Publications/blob/main/REverse_2025/UEFI%20Bootkit%20Hunting-%20In-Depth%20Search%20for%20Unique%20Code%20Behavior.pdf
GitHub
Research_Publications/REverse_2025/UEFI Bootkit Hunting- In-Depth Search for Unique Code Behavior.pdf at main · binarly-io/Res…
Contribute to binarly-io/Research_Publications development by creating an account on GitHub.
Deobfuscating Golang with Binary Ninja
https://invokere.com/posts/2025/03/ungarble-deobfuscating-golang-with-binary-ninja/
https://invokere.com/posts/2025/03/ungarble-deobfuscating-golang-with-binary-ninja/
Invokere
Ungarble: Deobfuscating Golang with Binary Ninja
In this blog post we explore using Binary Ninja and emulation to address obfuscation implemented by an open source obfuscator named Garble that is used by red team operators and malware authors to inhibit reverse engineering efforts.
CVE-2025–21333 Windows heap-based buffer overflow analysis
https://medium.com/@ale18109800/cve-2025-21333-windows-heap-based-buffer-overflow-analysis-d1b597ae4bae
https://medium.com/@ale18109800/cve-2025-21333-windows-heap-based-buffer-overflow-analysis-d1b597ae4bae
Medium
CVE-2025–21333 Windows heap-based buffer overflow analysis
CVE-2025–21333 is a Windows vulnerability detected by Microsoft as exploited by threat actors. Microsoft patched the vulnerability on…
Stealc Malware Analysis with Binary Ninja (Stream - 25/02/2025)
https://www.youtube.com/watch?v=zqVOhIK1cM8
https://www.youtube.com/watch?v=zqVOhIK1cM8
YouTube
Stealer Malware Analysis with Binary Ninja (Stream - 25/02/2025)
In this stream analyze a stealer malware variant with Binary Ninja and x64dbg. We wrote automation to decrypt all strings throughout the binary and looked at dumping resolved APIs automatically.
Learn how to reverse engineer malware: https://training.in…
Learn how to reverse engineer malware: https://training.in…