WHAT'S NEW
- All
- Accessories
- Android
- Android
- Apple
- Applications
- Blog
- Bluetooth
- Cyber security
- Database Assessment
- Exploitation Tools
- Forensics
- Hacking Courses
- Hacking Tools
- Information Gathering
- iphone
- Kali Linux
- Kali Linux Tools
- Linux
- Malware
- New Post
- Password Attacks
- PCI
- Pentesting Tools
- Phishing
- Post Exploitation
- Security Hacker
- Sniffing/Spoofing
- software
- Stress Testing
- TECH
- Tech today
- Tutorials
- VPN
- Vulnerability Analysis
- Web Application Analysis
- Wi-Fi
- Wi-Fi
- Windows
- Wireless Attacks
- YECH
NimPlant C2 : A Position Independent Code (PIC) Beacon
EUD : Exploring Qualcomm’s Embedded USB Debugger
Unleashed Recompiled : A Technical Deep Dive Into Sonic’s PC Transformation
XenonRecomp : A Tool For Recompiling Xbox 360 Executables
Tools Function In Research Publications: Enhancing Firmware Security And Performance
WINDOWS PHONE
MSC Dropper – A Python Tool For Custom MSC File Creation...
LATEST ARTICLES
NimPlant C2 : A Position Independent Code (PIC) Beacon
NimPlant C2 is a minimal Proof-of-Concept (PoC) beacon written in C, designed to operate as truly Position Independent Code (PIC) without relying on reflective loaders. Developed by Tijme Gommers, this project showcases a beacon that is significantly smaller in size compared to traditional NimPlant beacons with reflective loaders, weighing in at approximately 30KB versus 800KB. Key Features Position Independent Code (PIC):...
EUD : Exploring Qualcomm’s Embedded USB Debugger
The Embedded USB Debugger (EUD) is a sophisticated tool developed by Qualcomm to enhance the debugging and development processes for embedded systems. It functions as a mini High-Speed USB on-chip hub, providing USB-based debug and trace capabilities. EUD is particularly useful for diagnosing and resolving issues in complex embedded systems by leveraging the widely supported USB interface. Functionality Of EUD EUD...
Unleashed Recompiled : A Technical Deep Dive Into Sonic’s PC Transformation
Unleashed Recompiled is an unofficial PC port of Sonic Unleashed, created through the process of static recompilation. This innovative project leverages advanced tools like XenonRecomp and XenosRecomp to convert the original Xbox 360 PowerPC code and Xenos shaders into C++ and HLSL code, enabling compatibility with modern PC hardware. Below is an overview of the tools and their functions...
XenonRecomp : A Tool For Recompiling Xbox 360 Executables
XenonRecomp is a powerful tool designed to convert Xbox 360 executables into C++ code, allowing these executables to be recompiled for various platforms. Currently, it supports x86 platforms due to its reliance on x86 intrinsics. This project draws inspiration from similar tools like N64: Recompiled, which serves the same purpose for Nintendo 64 executables. Key Features Of XenonRecomp Instruction Conversion: XenonRecomp...
Tools Function In Research Publications: Enhancing Firmware Security And Performance
Research publications often introduce innovative tools and methodologies to address complex challenges in technology and cybersecurity. Two notable examples—Near-Native Rehosting for Embedded ARM Firmware and UEFI Bootkit Hunting—demonstrate how tools can significantly improve performance and detection capabilities in their respective domains. Near-Native Rehosting For Embedded ARM Firmware Rehosting, which involves running firmware in a virtualized environment rather than on original hardware,...
Solana Smart Contract Security Best Practices: Essential Tools And Functions
Ensuring the security of Solana smart contracts is crucial to prevent exploits and maintain the integrity of blockchain applications. The Solana ecosystem provides several tools and best practices to enhance security. Here's an overview of key tools and functions that help secure Solana smart contracts: Common Pitfalls And Solutions Integer Overflow/Underflow: Use checked_add, checked_sub, checked_div, and checked_mul to prevent overflows. Loss of...
Program Exposes Unsound And Incomplete Behavior In Compiler
The provided program highlights critical issues within the compiler, exposing both soundness and completeness violations. These bugs manifest in unexpected behavior during execution and compiler crashes, triggered by seemingly innocuous code changes. This article explores the problem, its symptoms, and implications. Program Behavior The program is written in Noir and aims to compute a value, out0, which should consistently return Field(0)...
BypassAV : Techniques To Evade Antivirus And EDR Systems
BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and Endpoint Detection and Response (EDR) systems. These security solutions are designed to detect and block malicious activities, but attackers continuously develop methods to evade them. Below is an overview of key techniques and tools used in bypassing AV and EDR systems. Key Techniques For Bypassing...
ComDotNetExploit : Exploiting Windows Protected Process Light (PPL)
ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and reflection techniques for code injection. PPL is a security feature introduced in Windows 8.1 to protect critical processes like LSASS from unauthorized access or modification. T his exploit bypasses code integrity checks, enabling malicious payload injection...
Trigon : A Revolutionary Kernel Exploit For iOS
Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability. This exploit, developed by Alfie CG and collaborators, introduces a groundbreaking approach to kernel exploitation by ensuring reliability and stability during and after execution. Unlike traditional methods prone to instability, Trigon guarantees deterministic outcomes, making it a significant advancement in iOS security research. Technical Overview At...