Power users are taking IDA headless with idalib.
Think large-scale diffing, custom UIs, and CI pipelines... all without launching a GUI.
💡 Get inspired: https://hex-rays.com/blog/4-powerful-applications-of-idalib-headless-ida-in-action
Website | https://security.humanativaspa.it |
https://www.linkedin.com/company/hnsecurity | |
https://twitter.com/hnsec |
Power users are taking IDA headless with idalib.
Think large-scale diffing, custom UIs, and CI pipelines... all without launching a GUI.
💡 Get inspired: https://hex-rays.com/blog/4-powerful-applications-of-idalib-headless-ida-in-action
My #idalib based tools are featured in the latest @HexRaysSA blog!
https://hex-rays.com/blog/4-powerful-applications-of-idalib-headless-ida-in-action
Exploring fault injection on ESP32 V3!
Inspired by Delvaux work, we tested voltage #glitching as an attack vector. With advanced triggers & GDB, we achieved a ~1.5% success rate. #Hardware #FaultInjection is becoming more practical!
https://security.humanativaspa.it/fault-injection-follow-the-white-rabbit/
During the weekend, I’ve been working a bit on updating my battle-tested #semgrep ruleset for #c #vulnerability research
https://github.com/0xdea/semgrep-rules
Nothing major, just a couple of small updates. It feels good to be back doing some #security #research! Let’s see where this takes me…
How was it like to attend the exclusive #ZeroDayQuest event? How did a Unix #hacker even qualify in the first place? How can you become one of the #Microsoft MVRs?
Our technical director @raptor answers these and other questions in his latest article:
https://security.humanativaspa.it/my-zero-day-quest-bluehat-podcast
A couple of days ago, I unearthed my first #computer, an #MSX straight from the ‘80s. It was lost in some box in the basement for who knows how long. Just feeling its power switch gave me the goosebumps…
This discovery came after sharing my hacker’s origin story with Nic Fillingham and Wendy Zenone in a new episode of Microsoft’s #BlueHat #Podcast.
https://thecyberwire.com/podcasts/the-bluehat-podcast/52/notes
Join us while we chat about my first-ever #CVE, overlooked #vulnerabilities that continue to pose significant risks today, #ActiveDirectory and #password security, my unexpected journey into #bugbounty hunting and my involvement in the #ZeroDayQuest, how to learn new things, mentorship and positive leadership, and of course pineapple pizza 🍍🍕
The final day of #ZeroDayQuest was truly a blast 💥 While I’m still unpacking all that has happened (not to mention a baggage full of swag), I’d like to thank once again #MSRC for their warm welcome and impeccable organization.
I’m so happy to have been part of an event that has already made history in our industry. Congratulations to all the winners! Cheers, my friends 🥂