﷽| cocomelonc
﷽| cocomelonc
﷽| cocomelonc
Assemblers in w64devkit, and other updates| nullprogram.com
Both compiler developers and security researchers have built disassemblers. They often prioritize different aspects. Compiler toolchains, benefiting from direct contributions from CPU vendors, tend to offer more accurate and robust decoding. Security-focused tools, on the other hand, often excel in user interface design. For quick disassembly tasks, rizin provides a convenient command-line interface.| MaskRay
DFRobot and NextPCB are currently running a PCB design contest offering free PCB manufacturing and prizes worth up to $800 to people designing and| CNX Software - Embedded Systems News
A more robust raw OpenBSD syscall demo| nullprogram.com
In the conclusions to my last post, “Modifying System Call Arguments With ptrace”, I mentioned that one of the main drawbacks of the explained approach for modifying system call arguments was that there is a process switch for each system call performed by the tracee. I also suggested a possible approach to overcome that issue … Continue reading "Filter and Modify System Calls with seccomp and ptrace"| Alfonso Sánchez-Beato's blog
CentOS| Boxes Of Tat
RedHat Linux| Boxes Of Tat
Mandrake Linux| Boxes Of Tat
RedHat Linux 6.2 on PCem| Boxes Of Tat
RedHat Linux| Boxes Of Tat
Slackware| Boxes Of Tat
Slackware| Boxes Of Tat
BeOS| Boxes Of Tat
In the last episode … As you’ve probably guessed it, this is the second part of my journey to reverse engineer a virtual machine protected binary. If you haven’t read the first part[1], I encourage you to do so, because I will not repeat everything again here. While the first part dealt with explaining the …Taming Virtual Machine Based Code Protection – 2 Read More »| Malware and Stuff
Being able to easily run and debug a simple operating system can be really useful when you want to learn how low level components are implemented. Xv6 is a very simple Unix-like operating system that allows you to do just that. sillysaurus2 exemplified this in the Hacker News’ thread on Xv6: Have you ever: Wondered how a filesystem can survive a power outage? Wondered how to organize C code? Wondered how memory allocation works? Wondered how memory paging works? Wondered about the differenc...| Runtime Checks
Le 8 juin 1978, Intel lançait son premier processeur 16 bits, le 8086. Cette puce a eu un impact énorme sur le marché de l’informatique et sur le succès économique d’Intel, au point que…| Infobidouille
The death of hardware store optimization.| Performance Matters
Examining the extent of AVX related downclocking on Intel’s Ice Lake CPU| Performance Matters
Taking a second look at the newly introduced mask registers, this time with the benefit of a SKX die shot from Fritzchens Fritz.| Performance Matters
We look at the zero store optimization as it applies to Intel’s newest micro-architecture.| Performance Matters
Probing a previously undocumented zero-related optimization on Intel CPUs.| Performance Matters
With Google’s recent announcement of support for running real Linux apps on Chrome OS, I picked up a Pixelbook, since I’ve been long awaiting the viability of Chromebooks as development machines. After setting up a dev VM and experimenting with various projects, I found that one Tensorflow application I was playing with would lock up, hard, inside the Crostini VM on my Chromebook. After adding some debug prints, I discovered that virtually any calls into numpy.linalg.inv were hanging. I c...| nelhage debugs shit
I have started with the course “Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration” by Xeno Kovah and it’s been wonderful so far. It is a repeat of m…| Arvind S Raj's Blog
The Intel N100 (and N200) seem to be Intel's attempt at trying to muscle into the market that high-end ARM SoCs look to have cornered. With the Rockchip| bret.dk
Variable argument lists are very arcane in the world of C. You’ll see them expressed in function signatures as … at the end of the parameter list, but you may not understand how they work or what they do.| Ruminations
In higher level languages like Java and C#, one can recover from unexpected bahaviour using try/catch like language constructs. Things are different inside Linux kernel. The code is considered trus…| Binary Debt
In our last post we covered how x86 logical address is translated into linear address. In this one we will look at translation from linear to physical. We will use the terms ‘virtual address&…| Binary Debt
Last year I wrote some Opus emphasis filter SIMD. Let's take a look at the C version for the inverse filter: static float deemphasis_c(float *y, float *x, float coeff, int len) { for (int i =...| Lynne's compiled musings
Introduction Ken Johnson (otherwise known as Skywing) first talked about the KiUserExceptionDispatcher back in 2007 . Since then, scattered around the internet are various posts talking about it, b…| modexp
The recent release of macOS 10.15.2 had some additional updates to the Xprotect yara rules within it. After reviewing what changed in the yara rules I decided to dig a little deeper into how Xprotect gets called. Jonathan Levin’s excellent book MacOS and iOS Internals, Volume III: Security & Insecurity briefly talks about Gatekeeper and Xprotect but didn’t have the internals I was looking for. I ended up finding Patrick Wardle’s excellent presentation from the 2015 Virus Bulletin Confer...| Scott Knight
One of the most exciting things announced at this years WWDC was System Extensions. From a security perspective I think this is a really important advancedment for macOS. It means less third party code running in kernel space which should mean more security and stability. From a programmers perspective I think this is even more important. It means that the code developers previously had to write in C++ can now be written in a more modern language like Swift. Apple has been attempting to wrang...| Scott Knight