bOt@zerobytes.monsterM · 1 year ago/r/ReverseEngineering's Weekly Questions Threadplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-square/r/ReverseEngineering's Weekly Questions Threadplus-squarebOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoWhen URL parsers disagree (CVE-2023-38633)plus-squarewww.canva.devexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhen URL parsers disagree (CVE-2023-38633)plus-squarewww.canva.devbOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAn "Undetectable Spyware" Program for Windows Machineplus-squareayushchandane.gumroad.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAn "Undetectable Spyware" Program for Windows Machineplus-squareayushchandane.gumroad.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoReverse Engineering With Unicorn Emulation - A Practical Approach (OALABS)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReverse Engineering With Unicorn Emulation - A Practical Approach (OALABS)plus-squareyoutu.bebOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAn Arcade Game So Rare I Know of Two Others; reverse engineering custom controlsplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAn Arcade Game So Rare I Know of Two Others; reverse engineering custom controlsplus-squareyoutu.bebOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agounity3d engineering and crack serviceplus-squarewww.google.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkunity3d engineering and crack serviceplus-squarewww.google.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoHow to symbolicate SwiftUI (and any Apple framework)plus-squarewww.emergetools.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to symbolicate SwiftUI (and any Apple framework)plus-squarewww.emergetools.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoLooking at the ChargePoint Home Flex Threat Landscapeplus-squarewww.zerodayinitiative.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLooking at the ChargePoint Home Flex Threat Landscapeplus-squarewww.zerodayinitiative.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year ago⚠️⚠️ CVE-2023-3959, CVE-2023-4249 - A large number of pre-auth and post-auth vulnerabilities found in IP cameras via automatic program analysisplus-squarebugprove.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link⚠️⚠️ CVE-2023-3959, CVE-2023-4249 - A large number of pre-auth and post-auth vulnerabilities found in IP cameras via automatic program analysisplus-squarebugprove.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoResults of Major Technical Investigations for Storm-0558 Key Acquisition | MSRC Blog | Microsoft Security Response Centerplus-squaremsrc.microsoft.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResults of Major Technical Investigations for Storm-0558 Key Acquisition | MSRC Blog | Microsoft Security Response Centerplus-squaremsrc.microsoft.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAPK anti tamper codeplus-squarereddit.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAPK anti tamper codeplus-squarereddit.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoRevealing AV/EDR's blind spotsplus-squareoverlayhack.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRevealing AV/EDR's blind spotsplus-squareoverlayhack.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAndroid 14 blocks all modification of system certificates, even as rootplus-squarehttptoolkit.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAndroid 14 blocks all modification of system certificates, even as rootplus-squarehttptoolkit.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agohem-hashes Hiew plugin v1.02 now supports CRC-32 checksum tooplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkhem-hashes Hiew plugin v1.02 now supports CRC-32 checksum tooplus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoZDI offers $1M in cash for hacking cars in the "Pwn2Own Automotive" contestplus-squaredeform.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkZDI offers $1M in cash for hacking cars in the "Pwn2Own Automotive" contestplus-squaredeform.cobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year ago/r/ReverseEngineering's Weekly Questions Threadplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-square/r/ReverseEngineering's Weekly Questions Threadplus-squarebOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoA vulnerability in Windows’s File History Service allows local users to gain elevated privileges on the Windows operating systemplus-squaressd-disclosure.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA vulnerability in Windows’s File History Service allows local users to gain elevated privileges on the Windows operating systemplus-squaressd-disclosure.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoHacking the Timex m851plus-squarelock.cmpxchg8b.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacking the Timex m851plus-squarelock.cmpxchg8b.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoAnnouncing Fibratus 2.0.0 - Runtime adversary detection and huntingplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnnouncing Fibratus 2.0.0 - Runtime adversary detection and huntingplus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoNew OpenSecurityTraining2 class "Debuggers 3301: HyperDbg" by Sina Karvandi (~16 hours)plus-squareost2.fyiexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew OpenSecurityTraining2 class "Debuggers 3301: HyperDbg" by Sina Karvandi (~16 hours)plus-squareost2.fyibOt@zerobytes.monsterM · 1 year agomessage-square0fedilink