|
MicrosVuln
@
microsvuln
Microscope
|
|
Vulnerability under the 🔬Microscope
|
|
|
151
Tweetovi
|
438
Pratim
|
513
Osobe koje vas prate
|
| Tweetovi |
| MicrosVuln proslijedio/la je tweet | ||
|
Ghidra Ninja
@ghidraninja
|
23 h |
|
Finally released part 2 of my »Reversing #WannaCry with #Ghidra« series!
In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.
youtube.com/watch?v=Q90uZS…
|
||
|
|
||
| MicrosVuln proslijedio/la je tweet | ||
|
Frank Denis
@jedisct1
|
18 h |
|
Yet another vulnerability in sudo sudo.ws/alerts/pwfeedb…
|
||
|
|
||
|
MicrosVuln
@microsvuln
|
1. velj |
|
DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.
github.com/m000/dtracker
#taint
|
||
|
|
||
| MicrosVuln proslijedio/la je tweet | ||
|
GitHub Security Lab
@GHSecurityLab
|
30. sij |
|
Do you know #aflplusplus? It brings interesting add-ons to AFL. @nosoynadiemas used it during his fuzzing research to create custom instrumentation whitelists, increasing AFL code coverage securitylab.github.com/research/fuzzi…
|
||
|
|
||
| MicrosVuln proslijedio/la je tweet | ||
|
Andrea Fioraldi
@andreafioraldi
|
30. sij |
|
Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov.
github.com/vanhauser-thc/…
I used it to build the Redqueen mutator in AFL++!
|
||
|
|
||
|
MicrosVuln
@microsvuln
|
30. sij |
|
PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610
python
github.com/ioncodes/BlueG…
|
||
|
|
||
| MicrosVuln proslijedio/la je tweet | ||
|
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ
@Pat_Ventuzelo
|
30. sij |
|
🎉 New #fuzzing blogpost :)
Quick blogpost about how I found a OOM/DoS bug in a famous @npmjs/@nodejs package using coverage-guided #javascript fuzzer.
➡️ Fuzzer: Jsfuzz by @fuzzitdev
➡️ Target: wasm-parser
➡️ Bug: DoS/OOM
webassembly-security.com/fuzzing-npm-no…
#WeAssembly #js #wasm #NodeJS
|
||
|
|
||
|
MicrosVuln
@microsvuln
|
29. sij |
|
Fuzzing software: common challenges and potential solutions (Part 1) securitylab.github.com/research/fuzzi… #fuzzing #exploitation
|
||
|
|
||
|
MicrosVuln
@microsvuln
|
29. sij |
|
And where are you guys at rode0day? no challenge anymore? can't wait for more challenges, I've armed myself with new fuzzers for hunting more! :-)
|
||
|
|
||
|
MicrosVuln
@microsvuln
|
27. sij |
|
A few more efficient fuzzers has already been added to list .
Check github.com/Microsvuln/Awe…
Thanks to van Hauser @hackerschoice
#awesome_afl #AFL #fuzzer #securitytesting #vulnerability
|
||
|
|
||
|
MicrosVuln
@microsvuln
|
22. sij |
|
ApplicationInspector - source code analyzer by Microsoft
github.com/Microsoft/Appl…
#codereview
|
||
|
|
||
|
MicrosVuln
@microsvuln
|
10. sij |
|
Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics) github.com/guyinatuxedo/n…
#reverse #exploitation
|
||
|
|
||
| MicrosVuln proslijedio/la je tweet | ||
|
Richard Johnson
@richinseattle
|
5. sij |
|
Interesting paper qualitatively analyzing reverse engineering process & methods twitter.com/dmolnar/status…
|
||
|
|
||
| MicrosVuln proslijedio/la je tweet | ||
|
expend
@expend20
|
20. pro |
|
Qt Gif parsing null deref rediscovered with #WinAFL
tw1st.link/2019/12/20/qt-…
|
||
|
|
||
| MicrosVuln proslijedio/la je tweet | ||
|
didu
@0xdidu
|
19. pro |
|
Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): github.com/0xdidu/Reverse…
Hoping to spread the RE fever :)
|
||
|
|
||
|
MicrosVuln
@microsvuln
|
19. pro |
|
|
||
|
|
||
|
MicrosVuln
@microsvuln
|
19. pro |
|
|
||
|
|
||
| MicrosVuln proslijedio/la je tweet | ||
|
SandboxEscaper
@SandboxBear
|
17. pro |
|
Procmon works very well for me. If I were to write my own tooling, I would write something similar to process monitor, atleast visually, that allows you to hook arbitrary functions (ones that are used for resource access) to find race conditions elsewhere, not just filesystem
|
||
|
|
||
|
MicrosVuln
@microsvuln
|
16. pro |
|
Pretty! :-)
|
||
|
|
||
| MicrosVuln proslijedio/la je tweet | ||
|
Kostya Serebryany
@kayseesee
|
13. pro |
|
Running libFuzzer in a browser, via WASM.
We need to go deeper (?)
github.com/jonathanmetzma…
|
||
|
|
||