Microsoft recently announced the launch of Project Ire – a dedicated AI agent for malware… Project Ire – Microsoft Launches AI Agent For Automated Malware Classification on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses.| Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Test...
The following post will talk about the design of the first version of the Intermediate Representation of Kunai, the design decisions and how it was implemented.| Eduardo Blázquez’s Personal Webpage
My personal notes about the ELF file format| Eduardo Blázquez’s Personal Webpage
My personal notes about the Linux ptrace syscall| Eduardo Blázquez’s Personal Webpage
Hex-rays has published a second CTF where we have to uncover the location of the traitors in the story of Madame de Maintenon (the IDA Lady)| Eduardo Blázquez’s Personal Webpage
Following the previous post about using Triton for solving challenges through symbolic execution and SMT Solving, this time we will try solving an obfuscated hacklu.| Eduardo Blázquez’s Personal Webpage
Triton is a library for doing Symbolic Execution, useful for doing common CTF challenges and analyzing obfuscations. TritonDSE is a library built on top of Triton which provides easy and customizable Dynamic Symbolic Execution Capabilities| Eduardo Blázquez’s Personal Webpage
Kunai is a library for analyzing Dalvik Executable Files, this library is written in C++ for performance reasons| Eduardo Blázquez’s Personal Webpage
In this very brief post I'm going to share a tool I've build that does binary taint analysis using Angr. There really isn't much to talk about since the code is pretty readable and not complex but I will also walk though a quick introduction to the concept and why its cool. The post will include links to all the scripts used. I should mention that the tools used here are research tools they have bugs, they don't always run so smooth and there's a bunch of cases they can't manage; but they do ...| k3170
Hi folks, in the previous post I covered a simple example showing how Angr can speed up solving keygen / crackme type challenge. In this one I'm covering an explanation of how symbolic modeling of registers works with Angr and throwing in a weird little problem that required argv constraints to solve.| k3170