Cracking my own CrackMe with r2aiRecently, I viewed the excellent “Cracking binaries with r2ai visual mode” by Daniel Nakov, at r2con 2024. In September 2024, I had tried…5d ago5d ago
Creating inefficient IT, or hiding our own inefficiency behind ITWe, humans, normally have brains, and a heart, and we should use them more.Oct 16, 2024Oct 16, 2024
The Next Generation Conference FormatI have now been attending conference for … hum … several decades and I believe the traditional format of 30, 40 or 50-minute talks should…Oct 4, 2024Oct 4, 2024
Arguments descriptor arrays in DartWhile reading Dart assembly, you may have noticed lines such as the following:Sep 19, 20241Sep 19, 20241
Using AI-assisted decompilation of Radare2A few months ago, Radare2 (aka r2), an open source disassembler which can be entirely used by command line, started implementing AI plugins…Sep 17, 2024Sep 17, 2024
Dart shifts to standard calling conventionUp until Dart SDK v3.4.0, Dart was using an uncommon calling convention where all arguments for a function were passed on the stack [see my…Jul 19, 2024Jul 19, 2024
Untangling Android/TangleBotWe dig in a malicious sample of Android/TangleBot of May 2024. TangleBot is also reported as a BankBot, although it is more an Android RAT…Jul 12, 20241Jul 12, 20241
On the security of Google SecretsGoogle Secrets Gradle plugin is “for providing your secrets securely to your Android project”. I would like to make it clear in this…Jul 11, 2024Jul 11, 2024
Inside Sinchat Flutter riskwareIn this blog post, we analyze 2 borderline Flutter apps. As I’ll explain in conclusion, they are not malicious but expose borderline/risky…May 24, 2024May 24, 2024
Testing Restricted Settings of Android 13 on an emulatorAndroid 13 introduced a new security measure called “Restricted Settings”. The measure is meant to limit access to notification settings…Apr 4, 2024Apr 4, 2024