Android and the mysteries of dial codes ​ – Extracting dial codes by apk reversing
| | | | |

Android and the mysteries of dial codes ​ – Extracting dial codes by apk reversing

Android and the mysteries of dial Codes Extracting dial codes by apk reversing Dial Codes, also called USSD or HMI (Human Machine Interface) codes, are typically used by OEM and carrier to implement some menu. While making baseband researches, those hidden menus was very useful. Today, in this small blogpost, I will described the way…

android reversing lm deobfuscation
| | | | |

Benchmarking Android APK Deobfuscation using Small Local LLMs

Ai-assisted Android application reversing Benchmarking Android APK Deobfuscation using Small Local LLMs Tool Overview – Deobfuscate-android-app Android applications are commonly obfuscated before release, especially when they handle sensitive logic such as authentication, license verification, or cryptographic routines. Obfuscation tools like ProGuard and R8 rename classes and methods, remove debug information, and flatten control flows to…

openai chatgpt gpt3.5 gpt4 gpt3 hacking cybersecurity pentesting audit reversing vulnerability research
| |

GPT-4 for Bug Bounty, Audit & Pentesting?? He actually found some 0-days

Chatgpt GPT-4 for Bug Bounty, Audit & Pentesting?? He actually found some 0-days I gave some snippets of code (where I already found bugs) to OpenAI GPT-4 and I ask him to find vulnerabilities for me. It’s mind-blowing, it even found some 0 days. You will get access of the complete tutorial with source code, cheat…

openai chatgpt gpt3.5 gpt4 gpt3 hacking cybersecurity pentesting audit reversing
| |

🤯 Mind-Blowing examples of OpenAI ChatGPT for Security, Infosec & Hacking

🤯 Mind-Blowing examples of OpenAI ChatGPT for Security, Infosec & Hacking It’s just mind-blowing! it’s so impressive that this AI is able to answer such complex subjects as exploitation, reversing, decompilation, etc. The is a huge potential for us in the future to go even faster into learning IT security and hacking by being helped…

cairo starknet starkware cairo-lang reversing disassembly decompilation analysis voyager reverse engineering thoth
|

Starknet/Cairo Contract Reverse Engineering, Disassembly & Analysis with Thoth

Starknet/Cairo Contract Reverse Engineering, Disassembly & Analysis with Thoth In this video, I will show how to reverse, disassemble, decompile and analyze Cairo smart contracts deployed on Starknet using Thoth, our Fuzzinglabs’s Cairo/Starknet bytecode analyzer, disassembler & decompiler. https://youtu.be/T0KvG8Zps6I You will get access of the complete tutorial with source code, cheat sheet and or complete…

evm reversing ethereum smart contract reverse engineering disassembly bytecode opcodes
| |

Ethereum/EVM Smart Contract Reverse Engineering & Disassembly

Ethereum Smart Contract Reverse Engineering &EVM Disassembly Today I’m showing how EVM disassembly works and how to reconstruct the control flow graph (CFG) of an Ethereum smart contract when you only have access to the bytecode (closed-source). It’s really useful when you’re looking to analyze in-depth a contract at the EVM bytecode level. https://youtu.be/I6VDBvX9Pkw You…

reverse reversing reverse engineering books
|

Top 5 books to learn Reverse Engineering in 2022

Top 5 books to learn Reverse Engineering Today, I will like to show you my TOP 5 books to start learning Reversing. Those books are definitely a must-read for everyone that wants to improve their skills in reverse engineering! Reversing: Secrets of Reverse Engineering – link Practical Reverse Engineering – link The IDA Pro Book,…

reversing, wasm, webassembly, ethereum , ewasm, ethcc, training, security, blockchain, smart contract, patrick, ventuzelo

Reversing Ewasm contract 101 – EthCC 2020

Reversing Ewasm smart contracts 101 – EthCC 2020 I just gave a talk/workshop today (03/2020) at EthCC 2020 (Paris – France), about reversing Ewasm (Ethereum flavored WebAssembly) smart contract. In this talk, I briefly introduce WebAssembly concepts , Ewasm ethereum specificity and opcodes/instructions. Secondly, I show how to create Ewasm smart contracts and expose different techniques/tools…

google keep wasm webassembly module patrick ventuzelo security analysis ink Sketchology protobuf webgl
|

Analysis of Google Keep WebAssembly module

Analysis of Google Keep WebAssembly module Last month, i was at REcon Montreal to give my training about WebAssembly Security and after some discussion people always ask me this question: Is WebAssembly already used in the wild? The answer is of course YES and some WebAssembly modules are potentially running right now in your browser…