Tags

Security

A thought on DDoS Prevention

3 minute read

OK, here’s a thought I came up with when having my wee dram in front of the fireplace the other day. We’ve come to learn to live with the day to day threat o...

Install BinDiff on Fedora

3 minute read

In March 2011 Google acquired the company Zynamics, the developer of the tools BinDiff and BinNavi. These two tools were thus assimilated by Google, perhaps ...

Debugging MIPS Programs in IDA Pro

1 minute read

Many embedded devices use the MIPS CPU architecture in their implementations to run for example Linux, which is one of the most popular implementations. MIPS...

Build IDA Pro Key Patch for Fedora

2 minute read

KeyPatch by Keystone is a rather powerful tool when it comes to reverse engineering and patching binaries in particular. It lets you write the mnemonics/asse...

Unlocking Huawei Datacards

5 minute read

In Sweden the Huawei datacard is probably one of the most widely used datacards around. They are offered by operators to attract consumers to their services ...

SMTPTX

2 minute read

SMTPTX is a very simple tool written in Python used for sending simple email and do some basic email testing from a pentester perspective. Its able to send m...

Pwned by a QR Code

6 minute read

More and more use bar codes outside the retail industry as a source or pointer to information. If you think about it, this also serves as a teaser to the obs...

Malware analysis - Part I

less than 1 minute read

This guide is the first one in a planned series of three. It guides the beginner and intermediate malware analyst in the art of malware analysis, by setting ...

The indian tech support

7 minute read

Perhaps you’ve heard about them? The Indian Microsoft technical support that has detected that your computer is infected with viruses and infested by hackers...

Back to top ↑

Reverse Engineering

Build Ghidra from source

5 minute read

Ghidra 10 has now been released. I’ve been reloading the Ghidra Github almost every day now in order to get my hands on the release. However, since a few wee...

Install BinDiff on Fedora

3 minute read

In March 2011 Google acquired the company Zynamics, the developer of the tools BinDiff and BinNavi. These two tools were thus assimilated by Google, perhaps ...

Debugging MIPS Programs in IDA Pro

1 minute read

Many embedded devices use the MIPS CPU architecture in their implementations to run for example Linux, which is one of the most popular implementations. MIPS...

Build IDA Pro Key Patch for Fedora

2 minute read

KeyPatch by Keystone is a rather powerful tool when it comes to reverse engineering and patching binaries in particular. It lets you write the mnemonics/asse...

Unlocking Huawei Datacards

5 minute read

In Sweden the Huawei datacard is probably one of the most widely used datacards around. They are offered by operators to attract consumers to their services ...

Malware analysis - Part I

less than 1 minute read

This guide is the first one in a planned series of three. It guides the beginner and intermediate malware analyst in the art of malware analysis, by setting ...

Back to top ↑

Tools

Install BinExport and BinDiff

6 minute read

BinDiff v7.1 has quite resently been released! So I thought I’d write an updated guide on how to install BinDiff on Fedora Linux. Since my last post on how t...

Build Ghidra from source

5 minute read

Ghidra 10 has now been released. I’ve been reloading the Ghidra Github almost every day now in order to get my hands on the release. However, since a few wee...

Build IDA Pro Key Patch for Fedora

2 minute read

KeyPatch by Keystone is a rather powerful tool when it comes to reverse engineering and patching binaries in particular. It lets you write the mnemonics/asse...

SMTPTX

2 minute read

SMTPTX is a very simple tool written in Python used for sending simple email and do some basic email testing from a pentester perspective. Its able to send m...

Back to top ↑

Hacking

SMTPTX

2 minute read

SMTPTX is a very simple tool written in Python used for sending simple email and do some basic email testing from a pentester perspective. Its able to send m...

Pwned by a QR Code

6 minute read

More and more use bar codes outside the retail industry as a source or pointer to information. If you think about it, this also serves as a teaser to the obs...

Back to top ↑

Electronics

Back to top ↑

0x90.se

0x90 Reboot

1 minute read

Ambition was low, oceans of time were not avilable…Then reallity still came knocking on the door, only this time I knowingly left the site unmaintained havin...

0x90.se Reboot

less than 1 minute read

Ambition was high, oceans of time available it seemed…Then reality came knocking on the door, as usual and the site became less and less maintained with no n...

Back to top ↑

Ghidra

Install BinExport and BinDiff

6 minute read

BinDiff v7.1 has quite resently been released! So I thought I’d write an updated guide on how to install BinDiff on Fedora Linux. Since my last post on how t...

Build Ghidra from source

5 minute read

Ghidra 10 has now been released. I’ve been reloading the Ghidra Github almost every day now in order to get my hands on the release. However, since a few wee...

Back to top ↑

Scams

The indian tech support

7 minute read

Perhaps you’ve heard about them? The Indian Microsoft technical support that has detected that your computer is infected with viruses and infested by hackers...

Back to top ↑

Malware

Malware analysis - Part I

less than 1 minute read

This guide is the first one in a planned series of three. It guides the beginner and intermediate malware analyst in the art of malware analysis, by setting ...

Back to top ↑

Telecom

Unlocking Huawei Datacards

5 minute read

In Sweden the Huawei datacard is probably one of the most widely used datacards around. They are offered by operators to attract consumers to their services ...

Back to top ↑

MIPS

Debugging MIPS Programs in IDA Pro

1 minute read

Many embedded devices use the MIPS CPU architecture in their implementations to run for example Linux, which is one of the most popular implementations. MIPS...

Back to top ↑

QEMU

Debugging MIPS Programs in IDA Pro

1 minute read

Many embedded devices use the MIPS CPU architecture in their implementations to run for example Linux, which is one of the most popular implementations. MIPS...

Back to top ↑

IDA Pro

Install BinDiff on Fedora

3 minute read

In March 2011 Google acquired the company Zynamics, the developer of the tools BinDiff and BinNavi. These two tools were thus assimilated by Google, perhaps ...

Back to top ↑

Fedora

Install BinDiff on Fedora

3 minute read

In March 2011 Google acquired the company Zynamics, the developer of the tools BinDiff and BinNavi. These two tools were thus assimilated by Google, perhaps ...

Back to top ↑

DDoS

A thought on DDoS Prevention

3 minute read

OK, here’s a thought I came up with when having my wee dram in front of the fireplace the other day. We’ve come to learn to live with the day to day threat o...

Back to top ↑

Kali Linux

Back to top ↑

BinDiff

Install BinExport and BinDiff

6 minute read

BinDiff v7.1 has quite resently been released! So I thought I’d write an updated guide on how to install BinDiff on Fedora Linux. Since my last post on how t...

Back to top ↑