rce.arteam
@arteam_rce
RCE team on the scene since 2001
This is a quite interesting example of system exploration, reversing and tech digging. Well done ! raymii.org/s/blog/Bringin…
🧠 Reverse engineers, your lab just got smarter. IDA Free 9.1 is now preinstalled in FLARE VM — @Mandiant 's open-source malware analysis environment. ➥ Lightweight static analysis with cloud decompilers ➥ One-click to launch IDA directly ➥ IDA Plugin ecosystem ready to…
Wrote a cross-platform library for rewriting / modifying code in executable files on a function level. Pretty simple to write advanced binary obfuscators using it. github.com/badhive/stitch Below shows what ~30 LOC using Stitch transforms a function into:
Code execution/injection technique using DLL PEB module structure manipulation github.com/RWXstoned/LdrS…
Looking at how much @vxunderground grew up, being a part of their collection of documents is an honour - our entire collection of tuts is on their site too
PHRACK is coming to @defcon! We're printing ~10,000 zines and giving an hour-long talk you won't want to miss! Stay tuned. 🔥 #40yrsOfPhrack #phrack72
This is a super guide. Didn’t know how to ..
Introduction to intercepting Linux system calls blog.mggross.com/intercepting-s… #cybersecurity #Linux
iOS 18 kernel exploit demo app released - halo-michael.github.io ✅flow_divert supports iOS 15.4.1 or 18 ✅ipc_kmsgs support iOS 15.3.1 or 18
PatchGuard internals (KPP, Kernel Patch Protection) r0keb.github.io/posts/PatchGua… Credits @r0keb #infosec
Two part series on BPFDoor backdoor analysis Part 1: haxrob.net/bpfdoor-past-a… Part 2: haxrob.net/bpfdoor-past-a… #infosec #Linux
Rust for malware development bishopfox.com/blog/rust-for-… TL;DR: This blog explores the advantages of using Rust over C for malware development, highlighting Rust's evasive characteristics and challenges for reverse engineering.
Oh beautiful this. Useful in some conditions.
Doppelganger: An Advanced LSASS Dumper with Process Cloning labs.yarix.com/2025/06/doppel…
Writeup on exploiting a heap overflow in Llama.cpp retr0.blog/blog/llama-rpc… #cybersecurity #llama
Amazing series of tuts !!
Windows kernel exploitation for beginners Part 1: mdanilor.github.io/posts/hevd-0/ Part 2: mdanilor.github.io/posts/hevd-1/ Part 3: mdanilor.github.io/posts/hevd-2/ Part 4: mdanilor.github.io/posts/hevd-3/ Part 5: mdanilor.github.io/posts/hevd-4/ #windows #infosec
I reverse engineered @cluely – and their desktop source code exposes their entire system prompts and models used. What's inside? 🧵
Thanks to @snowyuwa we will soon have much more comprehensive type support. He was a massive help in testing the new CMake setup ♥ More updates soon!
It is now super easy to build x64dbg and start contributing, give it a try!🤓
Excellent blog post on reverse engineering the Valve Anti-Cheat (VAC) solution codeneverdies.github.io/posts/gh-2/ #infosec #reverseengineering
🐲 If you enjoyed the Ghidra Basics series you can find all of the sample programs on my GitHub, plus loads more resources! github.com/jstrosch/learn…
New Spider Acitvator v1.0.0 Released! Windows Version + Without change SN! Just one-click + Auto checking compatibilty Device + iCloud, iMessage, Facetime, Call + Reboot, Apple Pay, App Store + Supported only checkm8 Device Download: mega.nz/file/sTgyRDIK#…