We @binarly_io just open-sourced our VulHunt framework at @REverseConf
GitHub: https://github.com/vulhunt-re/vulhunt
Documentation: https://vulhunt.re/docs
Slack: https://join.slack.com/t/vulhunt/shared_invite/zt-3pyjsrqef-xMVFB5C4J6718nPNJAk0Fw
| Website | https://re-dojo.github.io/ |
We @binarly_io just open-sourced our VulHunt framework at @REverseConf
GitHub: https://github.com/vulhunt-re/vulhunt
Documentation: https://vulhunt.re/docs
Slack: https://join.slack.com/t/vulhunt/shared_invite/zt-3pyjsrqef-xMVFB5C4J6718nPNJAk0Fw
Over the past couple years, I have come to know the #dotnet platform pretty well, from a developer's and a #reversing standpoint.
I can’t always say the same the #infosec community.
Today, I decided to rant a little (or maybe a lot 🙃)
Reverse Engineering the
World's Largest Music
Streaming Platform
For those who have the pleasure to reverse Go binaries:
As we approach the end of the year, we have a small gift for everyone.
We ran a series of Rust training sessions as an introduction to the Rust programming language, and we recorded them. The videos, along with the training materials, are now available online.
Thanks to Quentin Jerome and all the participants for their contributions.
📽️ https://www.youtube.com/playlist?list=PLhSWiKucshm5vWvFCqtJePVVYgIXH6_6y
🔗 https://github.com/ngsoti/rust-training
#rust #rusttraining #programming #cybersecurity #opensource #training
Here's the slides to my PoC 2024 keynote "An insider perspective on the offensive industry": https://webdl.nso.group/OffIndustry-PDF.pdf
My apologies for the delay in publishing these.
My slides from my talk at 0x41con 2024 are now available—might be less useful without the speaking, but nevertheless, enjoy :)
https://jonpalmisc.com/assets/slides/0x41con-2024-TheBeheadingOfMadameDeMaintenon.PUBLIC.pdf