#Article #ReverseEngineering #Firmware
📗Breaking Samsung firmware, or turning your S8/S9/S10 into a DIY “Proxmark”
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗Breaking Samsung firmware, or turning your S8/S9/S10 into a DIY “Proxmark”
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #ReverseEngineering #DOS
📗Pre-Crypto - Reverse engineering ancient DOS “encryption”
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗Pre-Crypto - Reverse engineering ancient DOS “encryption”
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #MalwareAnalysis
📗 Word Document Malware Analysis
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗 Word Document Malware Analysis
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #ReverseEngineering #Radare2
📗 Introduction to Reverse Engineering with radare2 Cutter
➖Part 1: Key Terminology and Overview (You Are Here)
➖Part 2: Analysing a Basic Program
➖Part 3: Solving a Crackme Challenge
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗 Introduction to Reverse Engineering with radare2 Cutter
➖Part 1: Key Terminology and Overview (You Are Here)
➖Part 2: Analysing a Basic Program
➖Part 3: Solving a Crackme Challenge
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #MalwareAnalysis #Radare2
📗 Intro to Cutter for Malware Analysis
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗 Intro to Cutter for Malware Analysis
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #ReverseEngineering #Frida
📗 r2-pay: anti-debug, anti-root & anti-frida (part 1)
This series of blog posts explains one way to resolve the r2-pay challenge released during the r2con2020 conference. This first part is about the anti-analysis tricks used to hinder reverse-engineering while the second part will be more focused on breaking the whitebox.
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗 r2-pay: anti-debug, anti-root & anti-frida (part 1)
This series of blog posts explains one way to resolve the r2-pay challenge released during the r2con2020 conference. This first part is about the anti-analysis tricks used to hinder reverse-engineering while the second part will be more focused on breaking the whitebox.
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #MalwareAnalysis
📗 Defeating Macro Document Static Analysis with Pictures of My Ca
Over the past few weeks I’ve spent some time learning Visual Basic for Applications (VBA), specifically for creating malicious Word documents to act as an initial stager. When taking operational security into consideration and brainstorming ways of evading macro detection, I had the question, how does anti-virus detect a malicious macro?
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗 Defeating Macro Document Static Analysis with Pictures of My Ca
Over the past few weeks I’ve spent some time learning Visual Basic for Applications (VBA), specifically for creating malicious Word documents to act as an initial stager. When taking operational security into consideration and brainstorming ways of evading macro detection, I had the question, how does anti-virus detect a malicious macro?
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
کانال بایت امن
#Article #ReverseEngineering #Frida 📗 r2-pay: anti-debug, anti-root & anti-frida (part 1) This series of blog posts explains one way to resolve the r2-pay challenge released during the r2con2020 conference. This first part is about the anti-analysis tricks…
#Article #ReverseEngineering #Frida
📗 r2-pay: anti-debug, anti-root & anti-frida (part 2)
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗 r2-pay: anti-debug, anti-root & anti-frida (part 2)
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #ReverseEngineering
📗 Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation
Android applications are becoming more and more obfuscated to prevent reverse engineering. While obfuscation can be applied on both, the Dalvik bytecode and the native code, the former is more challenging to analyze due to the structure of the bytecode as well as the API provided by Android Runtime.
🌐Article Link
🗳PDF File
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗 Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation
Android applications are becoming more and more obfuscated to prevent reverse engineering. While obfuscation can be applied on both, the Dalvik bytecode and the native code, the former is more challenging to analyze due to the structure of the bytecode as well as the API provided by Android Runtime.
🌐Article Link
🗳PDF File
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Github #Programming
Planet Source Code Github Repo
🌐 Project Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
Planet Source Code Github Repo
🌐 Project Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Github #Programming #Sploit
Sploit - Go package that aids in binary analysis and exploitation
🌐 Project Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
Sploit - Go package that aids in binary analysis and exploitation
🌐 Project Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #ReverseEngineering
📗 Reverse engineering 3D Movie Maker - Part 1 - using Ghidra scripting to recover the C++ class hierarchy
A while ago, I started reverse engineering Microsoft 3D Movie Maker to understand how it works and to develop my game reversing skills. This blog series is about my adventures in reversing 3D Movie Maker and some of the interesting things I learnt along the way.
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗 Reverse engineering 3D Movie Maker - Part 1 - using Ghidra scripting to recover the C++ class hierarchy
A while ago, I started reverse engineering Microsoft 3D Movie Maker to understand how it works and to develop my game reversing skills. This blog series is about my adventures in reversing 3D Movie Maker and some of the interesting things I learnt along the way.
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #ReverseEngineering
📗 Dynamic analysis of apps inside Android Cloning apps - Part 1,2
Recently I and my friend Vikas presented our research about risks for apps executing inside virtual containers aka cloning apps(VirtualApp, ParallelSpace, DualSpace, Dr.Clone, Clone, Multi-Parallel and many more cloning apps) in Android Security Symposium. The basis for most of the risks is, apps inside the virtual container get the same UID(Unix User ID).
🌐Part 1 - Part 2
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗 Dynamic analysis of apps inside Android Cloning apps - Part 1,2
Recently I and my friend Vikas presented our research about risks for apps executing inside virtual containers aka cloning apps(VirtualApp, ParallelSpace, DualSpace, Dr.Clone, Clone, Multi-Parallel and many more cloning apps) in Android Security Symposium. The basis for most of the risks is, apps inside the virtual container get the same UID(Unix User ID).
🌐Part 1 - Part 2
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
کانال بایت امن
#Article #ReverseEngineering 📗 Reverse engineering 3D Movie Maker - Part 1 - using Ghidra scripting to recover the C++ class hierarchy A while ago, I started reverse engineering Microsoft 3D Movie Maker to understand how it works and to develop my game…
#Article #ReverseEngineering
📗 Reverse engineering 3D Movie Maker - Part 2
A while ago, I started reverse engineering Microsoft 3D Movie Maker to understand how it works and to develop my game reversing skills. This blog series is about my adventures in reversing 3D Movie Maker and some of the interesting things I learnt along the way.
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗 Reverse engineering 3D Movie Maker - Part 2
A while ago, I started reverse engineering Microsoft 3D Movie Maker to understand how it works and to develop my game reversing skills. This blog series is about my adventures in reversing 3D Movie Maker and some of the interesting things I learnt along the way.
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #ReverseEngineering #PE
📗 Anatomy of a Binary Executable
Even though I’ve developed software for a number of years now, there’s one question that has always been in the back of my mind and I haven’t had the time or patience to really answer, until now: What is a binary executable anyways?
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗 Anatomy of a Binary Executable
Even though I’ve developed software for a number of years now, there’s one question that has always been in the back of my mind and I haven’t had the time or patience to really answer, until now: What is a binary executable anyways?
🌐Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Github #CTF
📗 Flare-On 2020
This folder contains writeups for the 2020 Flare-On CTF challenges. Writeups will be added incrementally, as I have to revisit my work for all 11 challenges.
I had a lot of fun working on these challenges, and I hope you enjoy reading about how I went about solving them.
🌐 Repo Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗 Flare-On 2020
This folder contains writeups for the 2020 Flare-On CTF challenges. Writeups will be added incrementally, as I have to revisit my work for all 11 challenges.
I had a lot of fun working on these challenges, and I hope you enjoy reading about how I went about solving them.
🌐 Repo Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
کانال بایت امن
#Article #ReverseEngineering 📗 Reverse engineering 3D Movie Maker - Part 1 - using Ghidra scripting to recover the C++ class hierarchy A while ago, I started reverse engineering Microsoft 3D Movie Maker to understand how it works and to develop my game…
#Article #ReverseEngineering
📗 Reverse engineering 3D Movie Maker - Part 3
A while ago, I started reverse engineering Microsoft 3D Movie Maker to understand how it works and to develop my game reversing skills. This blog series is about my adventures in reversing 3D Movie Maker and some of the interesting things I learnt along the way.
🌐 Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗 Reverse engineering 3D Movie Maker - Part 3
A while ago, I started reverse engineering Microsoft 3D Movie Maker to understand how it works and to develop my game reversing skills. This blog series is about my adventures in reversing 3D Movie Maker and some of the interesting things I learnt along the way.
🌐 Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #ReverseEngineering #CTF
📗 Reverse Engineering Obfuscated Code - CTF Write-Up
This is a write up for one of the FCSC (French Cyber Security Challenge) reverse engineering challenges.
🌐 Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗 Reverse Engineering Obfuscated Code - CTF Write-Up
This is a write up for one of the FCSC (French Cyber Security Challenge) reverse engineering challenges.
🌐 Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Github #Tools
🗳XAPKDetector is Android/APK/DEX detector for Windows, Linux and MacOS.
🔸Heuristic scan
🔸String viewer
🔸Hex viewer
🔸Entropy viewer
🔸Hash viewer
🔸ELF viewer
🔸DEX raw viewer
🌐 Project Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
🗳XAPKDetector is Android/APK/DEX detector for Windows, Linux and MacOS.
🔸Heuristic scan
🔸String viewer
🔸Hex viewer
🔸Entropy viewer
🔸Hash viewer
🔸ELF viewer
🔸DEX raw viewer
🌐 Project Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #ReverseEngineering
📗Reversing C++ Without Getting a Heart Attack – DEvirtualize VIrtual Calls With Devi
TLDR: This blogpost presents devi, a tool that can help you devirtualize virtual calls in C++ binaries. It uses Frida to trace the execution of a binary and uncover the call sources and destinations of virtual calls.
🌐 Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
📗Reversing C++ Without Getting a Heart Attack – DEvirtualize VIrtual Calls With Devi
TLDR: This blogpost presents devi, a tool that can help you devirtualize virtual calls in C++ binaries. It uses Frida to trace the execution of a binary and uncover the call sources and destinations of virtual calls.
🌐 Article Link
Telegram Channel : @securebyte
Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_