When you go fighting malware don´t forget your VT plugins

It’s been a year since we launched our VirusTotal plugin for IDA Pro, followed by SentinelOne’s amazing contribution to the community with their VirusTotal plugin for GHIDRA (thanks again for the great job), inspired by the original IDA plugin but addi… Continue reading When you go fighting malware don´t forget your VT plugins

Destroying x86_64 instruction decoders with differential fuzzing

TL;DR: x86_64 decoding is hard, and the number and variety of implementations available for it makes it uniquely suited to differential fuzzing. We’re open sourcing mishegos, a differential fuzzer for instruction decoders. You can use it to disco… Continue reading Destroying x86_64 instruction decoders with differential fuzzing

Announcing Automated Reverse Engineering Trainings

Consider our modular trainings. They can be organized to suit your company’s needs. You choose the number of skills and days to spend honing them.
The post Announcing Automated Reverse Engineering Trainings appeared first on Security Boulevard.
Continue reading Announcing Automated Reverse Engineering Trainings

Vulnerability Modeling with Binary Ninja

Plenty of static analyzers can perform vulnerability discovery on source code, but what if you only have the binary? How can we model a vulnerability and then check a binary to see if it is vulnerable? The short answer: use Binary Ninja’s MLIL an… Continue reading Vulnerability Modeling with Binary Ninja

Use our suite of Ethereum security tools

Two years ago, when we began taking on blockchain security engagements, there were no tools engineered for the work. No static analyzers, fuzzers, or reverse engineering tools for Ethereum. So, we invested significant time and expertise to create what … Continue reading Use our suite of Ethereum security tools

Malware Analysis, Threat Intelligence and Reverse Engineering: workshop slides

Last month, when I was in-between jobs, I gave a workshop for a group of 20-25 enthusiastic women, all either starting in infosec, or with an interest to start in this field.
The event, now obviously expired, can be found here:CWF Women in Cyber Event … Continue reading Malware Analysis, Threat Intelligence and Reverse Engineering: workshop slides