Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation
Paper:
https://raw.githubusercontent.com/quarkslab/conf-presentations/master/BlackHat-Asia-20/asia-20-Thomas-Dynamic-Binary-Instrumentation-Techniques-to-Address-Native-Code-Obfuscation-wp.pdf
Slides:
https://raw.githubusercontent.com/quarkslab/conf-presentations/master/BlackHat-Asia-20/asia-20-Thomas-Dynamic-Binary-Instrumentation-Techniques-to-Address-Native-Code-Obfuscation.pdf
#android #Obfuscation #binary
@securation
Paper:
https://raw.githubusercontent.com/quarkslab/conf-presentations/master/BlackHat-Asia-20/asia-20-Thomas-Dynamic-Binary-Instrumentation-Techniques-to-Address-Native-Code-Obfuscation-wp.pdf
Slides:
https://raw.githubusercontent.com/quarkslab/conf-presentations/master/BlackHat-Asia-20/asia-20-Thomas-Dynamic-Binary-Instrumentation-Techniques-to-Address-Native-Code-Obfuscation.pdf
#android #Obfuscation #binary
@securation
ARM64 Reversing and Exploitation
Part 1: http://highaltitudehacks.com/2020/09/05/arm64-reversing-and-exploitation-part-1-arm-instruction-set-heap-overflow/
Part 2: http://highaltitudehacks.com/2020/09/06/arm64-reversing-and-exploitation-part-2-use-after-free/
Part 3: http://highaltitudehacks.com/2020/09/06/arm64-reversing-and-exploitation-part-3-a-simple-rop-chain/
#reverse #binary #exploitation #arm64
@securation
Part 1: http://highaltitudehacks.com/2020/09/05/arm64-reversing-and-exploitation-part-1-arm-instruction-set-heap-overflow/
Part 2: http://highaltitudehacks.com/2020/09/06/arm64-reversing-and-exploitation-part-2-use-after-free/
Part 3: http://highaltitudehacks.com/2020/09/06/arm64-reversing-and-exploitation-part-3-a-simple-rop-chain/
#reverse #binary #exploitation #arm64
@securation
Prateekg147
ARM64 Reversing and Exploitation Part 1 - ARM Instruction Set + Simple Heap Overflow
Hi Everyone ! In this blog series, we will be understanding the ARM instruction set and using that to reverse ARM Binaries followed by writing exploits for them. So letβs start with the basics of ARM64.
Reverse engineering my router's firmware with binwalk
https://embeddedbits.org/reverse-engineering-router-firmware-with-binwalk/
#hacking #binary #binwalk
@securation
https://embeddedbits.org/reverse-engineering-router-firmware-with-binwalk/
#hacking #binary #binwalk
@securation
βοΈ (ImHex) A Hex Editor for Reverse Engineers
https://github.com/WerWolv/ImHex
#hex #reverse #binary
@securation
https://github.com/WerWolv/ImHex
#hex #reverse #binary
@securation
π₯9π1
βοΈFully dockerized Linux kernel debugging environment
#linux #binary #qemu #debugging
@securation
Building the kernelhttps://github.com/0xricksanchez/like-dbg
Creating a root file system to use with the earlier build kernel
A debuggee container that launches QEMU with our custom kernel + rootfs
A debug container that houses the debugging logic
#linux #binary #qemu #debugging
@securation
GitHub
GitHub - 0xricksanchez/like-dbg: Fully dockerized Linux kernel debugging environment
Fully dockerized Linux kernel debugging environment - 0xricksanchez/like-dbg
π8π1