Trivial Anti-BlueTeam trick for 32-bit systems
( Original text by hexacorn ) I love evasion tricks of any sort. Sometimes they can be very elaborate, and sometimes… incredibly
Code depilation salon: Articles, Code samples, Processor code documentation, Low-level programming, Working with debuggers
( Original text by hexacorn ) I love evasion tricks of any sort. Sometimes they can be very elaborate, and sometimes… incredibly
Once launched, IcedID takes advantage of an interesting technique to inject malicious code into svchost.exe — it does not require starting the
blanket https://github.com/bazad/blanket Blanket is a sandbox escape targeting iOS 11.2.6, although the main vulnerability was only patched in iOS 11.4.1. It exploits
Original post by Raphaël Rigo on syscall.eu ( under CC-BY-SA 4.0 ) TL;DR I dumped a Cypress PSoC 1 (CY8C21434) flash memory,
Original post by Raphaël Rigo on syscall.eu ( under CC-BY-SA 4.0 ) Introduction Analyzing and breaking external encrypted HDD has been a
In April 2018, while monitoring public data feeds, we noticed an interesting and previously unknown backdoor using HackingTeam’s leaked RCS source code.
As to get started, we will be writing a simple C++ program which will prompt for a password. It will check if
In this post, I will be using x64dbg since I wasn’t able to find a version of x64 Immunity debugger or Olly Debugger to
BOLO: Reverse Engineering — Part 2 (Advanced Programming Concepts) Preface Throughout this article we will be breaking down the following programming concepts and analyzing
By carefully examining the layout of the ARM1 processor, it can be reverse engineered. This article describes the interesting circuit used for