DIY Malware Homelab Course Do you have the desire to grow your skills in Malware Analysis, RE, and Software Engineering beyond just following tutorials? Arch Cloud Labs was built on honeypots and analyzing malware samples in a homelab environment to create a unique way to build those skills. This course offers a quick taste of building malware analysis pipeline in your homelab to recreate analysis done by large firms as well as inspire you to do analysis of your own.| Arch Cloud Labs
Recall (preview) was introduced earlier this year, with the ability to enable you to quickly find and jump back into what you have seen before on your PC. You can use an explorable timeline to find the content you remember seeing before. You can also use semantic powered search and just describe how you remember something and Recall will retrieve the moment you saw it. Any photo, link, or message can be a fresh point to continue from. | support.microsoft.com
Hack the FreeBSD kernel for yourself!| nostarch.com
About The Project I recently bought an discontinued TrendNet Router to become more proficient at reverse engineering embedded systems. Each year at DEF CON, the IoT Village,and Embedded Village have CTFs/hands-on workshops, and I’m hoping to get my skills up to par to go and take a crack at one of them next year. TrendNet home router model “TEW-731BRv2” has a known vulnerability identified by CVE-2015-1187) that leads to remote code execution.| Arch Cloud Labs