asteroza + binary   68

CBOR — Concise Binary Object Representation | Overview
CBOR is an alternative to JSON, where it's a self describing binary protocol so no schema needed. Possible alternative to Avro/ProtoBuf as well
CBOR  binary  serialization  data  format  webdev  programming  development  alternative  JSON  protobuf 
5 weeks ago by asteroza
[1906.02928] Software Ethology: An Accurate and Resilient Semantic Binary Analysis Framework
Interesting work at looking at IO behavior patterns rather than direct binary comparison. Seems suited for hunting architecture bugs?
computer  science  research  binary  semantic  analysis  fuzzer  fuzzing 
june 2019 by asteroza
Hacking around HTA files - Sevagas
How about stuffing an HTA into the PE sig of a binary...
HTA  file  format  abuse  security  hacking  pentesting  polyglot  append  binary 
december 2018 by asteroza
alex's coding playground » USB Image Tool
Useful for making backups of SD media boot images
USB  SD  binary  full  backup  image  software  tools  utilities  sysadmin  tips  tricks  windows  clone  format 
may 2018 by asteroza
AirbusCyber/grap: grap: define and match graph patterns within binaries
grep-ish for binaries, more powerful than flat file static analysis of binary patterns in YARA, due to metadata access?
binary  match  grep  search  graph  security 
january 2018 by asteroza
Scripting/ at master · K2/Scripting
Calling a server which seems to have per page SHA256 hashes for every windows binary, ever
windows  page  hash  SHA256  lookup  binary  integrity  check  test  DFIR  security 
october 2017 by asteroza
subTee/DriveCrypt: DriveCrypt Dcr.sys vulnerability exploit
Using vulnerable signed kernel drivers to load unsigned drivers for fun and profit
windows  kernel  driver  signed  research  security  binary  Delicious 
january 2017 by asteroza
remote.exe - a useful, MS signed SMB shell
remote.exe is a signed SMB shell, which will only end in tears...
security  pentesting  hacking  whitelist  bypass  signed  binary  SMB  shell  Delicious 
november 2016 by asteroza
Modified "zpool" for NexentaStor 3.1.0 - Solarismen
Here's the patched nexenta zpool to force ashift 12 zpool creation, called zpool-nx310
nexenta  NexentaStor  force  ZFS  ashift  12  binary  4K  sector  HDD  zpool  sysadmin  tips  tricks  tools  utilities  Delicious 
september 2016 by asteroza
Interesting double gate design
binary  carabiner  double  gate  lock  camping  gear  hardware  Delicious 
august 2016 by asteroza | an Enabling Encoding for Media Applications
OSC is a simple binary message protocol for controlling sound stuff, but when done over UDP, it's a fast minimal MPI.
OSC  binary  protocol  network  MPI  UDP  Delicious 
june 2016 by asteroza
Parser combinators for binary formats, in C.
binary  format  protocol  parser  library  opensource  software  Delicious 
november 2014 by asteroza
If you control somebody's DNS, you could redirect them to this to get them to download an attack binary due to weak update methodology (plaintext HTTP downloads with no public key binary signing checking). There was a nice attack article about someone who got worked over via a LinkedIn message based XSS attacking their home router DNS settings, then lying in wait until the poor guy tried to update N++.
evilgrade  ISR-evilgrade  MitM  update  fake  binary  attack  vector  framework  exploit  security  hacking  pentest  tools  utilities  software  DNS  false  Delicious 
april 2014 by asteroza
Wasabi Energy
Appears to use a kalina cycle ammonia phase change heat engine with a microturbine for small scale low grade heat applications, such as bottoming cycles.
kalina  cycle  low  temperature  heat  engine  ammonia  bottoming  grade  geothermal  binary  power  generator  green  energy  microturbine  Delicious 
february 2012 by asteroza
Using a scroll compressor in reverse for a compact rankine cycle waste heat binary power generator.
Ulvac-Riko  japan  rankine  cycle  binary  R134a  waste  heat  power  generator  scroll  expansion  turbine  Delicious 
june 2011 by asteroza

related tags

3D  4K  32bit  abuse  algorithm  alogrithm  Alpha  alternative  ammonia  analysis  anaysis  API  append  application  archive  ARM  array  ascii  ashift  ASLR  assembler  assembly  attack  AVR  AWS  BabayaTV  backup  base  bath  binaries  binary  blackbox  blacklist  BLOB  Blosc  bottoming  bug  build  bypass  byte  C  C#  C++  CA  call  camouflage  camping  capture  carabiner  CBOR  certificate  channel  character  check  clone  code  communication  comparison  compile  compression  compressor  computer  conary  container  control  conversion  converter  correct  counting  Courgette  crawler  crawling  curve  custom  cycle  cylance  data  debugger  debugging  decoder  decompression  decompressor  decrypting  Delicious  design  Detours  development  DFIR  DHT  diff  digit  disassembler  distribution  DLL  DNS  documentation  double  download  driver  DynamoRIO  editor  EDR  ELF  encoding  encrypted  encryption  energy  engine  engineering  enumeration  evilgrade  exe  executable  execution  exfiltration  expansion  exploit  extension  fake  false  FastLZ  FatELF  file  fileless  filling  force  forensic  forensics  format  framework  full  function  fuzzer  fuzzing  gate  gear  generator  geothermal  GIT  google  grade  graph  graphing  green  grep  hacking  hardware  hash  HBGary  HDD  Heap  heat  hex  hidden  hiding  Hilbert  history  hot  HTA  image  implementation  in-memory  information  infoviz  injection  inmemory  install  instruction  instrumentaqtion  instrumentation  integrated  integrity  interception  interface  investigation  isight  ISO  ISR-evilgrade  japan  java  javascript  JSON  junk  kalina  kernel  lambda  library  linked  linux  lock  LOLbin  lookup  low  LZ4  LZ4HC  mac  malware  management  mapping  masscan  match  memory  mercurial  mergesort  message  metacompressor  metrics  microgenerator  microsoft  microturbine  mimikatz  MIPS  MitM  MPI  neo4J  network  nexenta  NexentaStor  Nigata  node  number  Nvidia  obfuscation  octal  octomatics  OllyDbg  online  onsen  opensource  OSC  OSC-over-UDP  osx  OTEC  package  packaging  packer  page  parser  passing  payload  PDF  pentest  pentesting  persistence  pipeline  PoC  PoCorGTFO  polyglot  portable  power  PowerPC  powershell  program  programming  proof-of-concept  protobuf  protocol  python  R134a  radare2  rankine  reference  reflective  registry  RELRO  renewable  research  Responder  retrieval  reverse  reversing  rotor  runtime  rust  science  scm  screw  scroll  SD  SDC  SDL  search  sector  security  self  semantic  serialization  serverless  service  SHA256  shared  shell  signed  SMB  snappy  software  solar  sort  source  space  SPARC  Spider  spring  spying  static  statically  statistics  steganography  string  structure  svn  sysadmin  system  telehash  temperature  test  testing  text  thermal  tips  tool  tools  trace  tracing  tree  tricks  TrueCrypt  turbine  typed  UDP  Ulvac-Riko  universal  unpacker  update  USB  UTF-8  UTF-16  utilities  vector  version  video  viewer  visualization  vyatta  waste  webdev  whitelist  win32  windows  winPE  x86  YARA  ZFS  ZIP  zlib  zpool 

Copy this bookmark: