bOt@zerobytes.monsterM · 1 year agoAndroid 14 blocks all modification of system certificates, even as rootplus-squarehttptoolkit.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAndroid 14 blocks all modification of system certificates, even as rootplus-squarehttptoolkit.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agohem-hashes Hiew plugin v1.02 now supports CRC-32 checksum tooplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkhem-hashes Hiew plugin v1.02 now supports CRC-32 checksum tooplus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoZDI offers $1M in cash for hacking cars in the "Pwn2Own Automotive" contestplus-squaredeform.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkZDI offers $1M in cash for hacking cars in the "Pwn2Own Automotive" contestplus-squaredeform.cobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year ago/r/ReverseEngineering's Weekly Questions Threadplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-square/r/ReverseEngineering's Weekly Questions Threadplus-squarebOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAnnouncing Reko decompiler version 0.11.4plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnnouncing Reko decompiler version 0.11.4plus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoA vulnerability in Windows’s File History Service allows local users to gain elevated privileges on the Windows operating systemplus-squaressd-disclosure.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA vulnerability in Windows’s File History Service allows local users to gain elevated privileges on the Windows operating systemplus-squaressd-disclosure.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoHacking the Timex m851plus-squarelock.cmpxchg8b.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacking the Timex m851plus-squarelock.cmpxchg8b.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAnnouncing Fibratus 2.0.0 - Runtime adversary detection and huntingplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnnouncing Fibratus 2.0.0 - Runtime adversary detection and huntingplus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoNew OpenSecurityTraining2 class "Debuggers 3301: HyperDbg" by Sina Karvandi (~16 hours)plus-squareost2.fyiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew OpenSecurityTraining2 class "Debuggers 3301: HyperDbg" by Sina Karvandi (~16 hours)plus-squareost2.fyibOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year ago/r/ReverseEngineering's Triannual Hiring Threadplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-square/r/ReverseEngineering's Triannual Hiring Threadplus-squarebOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoHow to set up a proper debugging environment in rootless ios 15+plus-squarefelipejfc.medium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to set up a proper debugging environment in rootless ios 15+plus-squarefelipejfc.medium.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoFaronics-DeepFreeze-8-Exploit: Full exploit chain for Faronics-DeepFreeze-8plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFaronics-DeepFreeze-8-Exploit: Full exploit chain for Faronics-DeepFreeze-8plus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoA Deep Dive into Brute Ratel C4 payloadsplus-squarecybergeeks.techexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Deep Dive into Brute Ratel C4 payloadsplus-squarecybergeeks.techbOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoPoor man's guide to de-obfuscating VMProtect's import obfuscation-Reconstruction [3/3] [YouTube]plus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPoor man's guide to de-obfuscating VMProtect's import obfuscation-Reconstruction [3/3] [YouTube]plus-squarewww.youtube.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoEmulation Fundamentals - Writing A Basic x86 Emulator (OALABS Tutorial)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEmulation Fundamentals - Writing A Basic x86 Emulator (OALABS Tutorial)plus-squareyoutu.bebOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoGhidra 10.3.3 released!plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGhidra 10.3.3 released!plus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoInvestigating some hardening techniques from a CraxsRAT Brazilian variantplus-squarezyg0te.medium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInvestigating some hardening techniques from a CraxsRAT Brazilian variantplus-squarezyg0te.medium.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoBeyond Java: Obfuscating Android Apps with Purely Native Codeplus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBeyond Java: Obfuscating Android Apps with Purely Native Codeplus-squarewww.youtube.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAnalysis of Obfuscations Found in Apple FairPlayplus-squarenicolo.devexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnalysis of Obfuscations Found in Apple FairPlayplus-squarenicolo.devbOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoDNS Remote Code Execution: Part 2, Writing the Exploit [YouTube]plus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDNS Remote Code Execution: Part 2, Writing the Exploit [YouTube]plus-squarewww.youtube.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink