187 Followers
12 Following
278 Posts
Interested in reverse engineering, firmware, bluetooth, trusted computing, and training. Founder of @OpenSecurityTraining2 https://ost2.fyi
If you're serious about reverse engineering, you need to master a powerful debugger. Dbg1103 walks you through Binary Ninja's debugger hands-on, so you can hit the ground running on real targets. https://ost2.fyi/Dbg1103 by Xusheng Li
Singularitarians be like “Through Claude all things are possible”
Why would anyone learn about Windows kernel exploitation?! Take https://ost2.fyi/Exp4011 by @saidelike and learn about Windows kernel internals, vulnerability exploitation engineering, heap grooming, race condition, UAF, and what it takes to find your own exploitation primitives!
The TPM classes at OST2 are a great way to learn about the most widely available hardware-backed security mechanism for the low-low price of $0 from the comfort of your own emulator :)
From: @OpenSecurityTraining2
https://infosec.exchange/@OpenSecurityTraining2/116318183832419232
OpenSecurityTraining2 (@[email protected])

📣New OST2 class release!📣 The TPM trilogy is complete! "TC1103: Advanced TPM usage" by Dimi Tomov is now public at https://ost2.fyi/TC1103! Learn about advanced TPM policy access controls, protecting external keys in a TPM, implementing maximum security TPM-backed FDE, and more!

Infosec Exchange
Why spend time on fake vulnerabilities at a CTF when you could learn 38 *real* CVEs? Take "C-Family Software Implementation Vulnerabilities " https://ost2.fyi/Vulns1001 by @xenokovah and @glitchnsec today!
I finally got the BT data sniffed at @DistrictCon and @hardwear-io.bsky.social uploaded to the BTIDALPOOL crowdsourcing server. Now folks who take https://ost2.fyi/BT2222 "Bluetooth reconnaissance with Blue2thprinting" will have more data (from hacker conferences!) to poke around in!

New releases of WHAD and ButteRFly! 🥳

- WHAD v1.2.15 has just been released and fixes many critical issues.

- ButteRFly v1.1.3 has also been released to include a fix related to Logitech's Unifying protocol submitted by gentilkiwi.

More information on https://github.com/whad-team/whad-client/releases/tag/v1.2.15 and https://github.com/whad-team/butterfly/releases/tag/v1.1.3.

Release Version 1.2.15 · whad-team/whad-client

What's Changed Adds a specific class for CLI applications that provides a --force-stdout option to disable tool chaining (fixes #332) by @virtualabs in #335 Fixes a regression in WHAD's BLE analyz...

GitHub
Why read about TPM 2.0 in a spec when you can drive it with Python? 🐍 TC2202 teaches real-world TPM programming with tpm2-pytss, taught by its author, Bill Roberts. Hardware-backed crypto, hands-on labs, no fluff. https://ost2.fyi/TC2202
Move from basic fuzzing to a high-performance workflow. Fuzzing 1001 https://ost2.fyi/Fuzz1001 bridges the gap between theory and practical research. Master AFL++, PCGUARD, LTO, and ASAN using real CVEs from Xpdf and tcpdump.