 
      
    | You are here | www.huntandhackett.com | ||
| | | | | reverse.put.as | |
| | | | | Little Snitch was among the first software packages I tried to reverse and crack when I started using Macs. In the past I reported some weaknesses related to their licensing scheme but I never audited their kernel code since I am not a fan of IOKit reversing. The upcoming DEF CON presentation on Little Snitch re-sparked my curiosity last week and it was finally time to give the firewall a closer look. | |
| | | | | blog.fox-it.com | |
| | | | | Authors: Boudewijn Meijer && Rick Veldhoven Introduction As defensive security products improve, attackers must refine their craft. Gone are the days of executing malicious binaries from disk, especially ones well known to antivirus and Endpoint Detection and Reponse (EDR) vendors. Now, attackers focus on in-memory payload execution for both native and managed applications to evade... | |
| | | | | googleprojectzero.blogspot.com | |
| | | | | Posted by Gal Beniamini, Project Zero Mobile devices are becoming an increasingly privacy-sensitive platform. Nowadays, devices process ... | |
| | | | | blog.florimondmanca.com | |
| | | Type hints add optional static typing to Python 3.5+, and I love them. I now use annotated variables throughout my projects. | ||