Loading...

Version Tracking in Ghidra

When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary's behaviour. These annotations come in the form of comments, renamed functions, variables, arguments and more. [...]

By |2024-08-07T13:36:38+00:00August 7, 2024|

Emulation with Qiling

Qiling is an emulation framework that builds upon the Unicorn emulator by providing higher level functionality such as support for dynamic library loading, syscall interception and more. In this Labs post, we are [...]

By |2024-05-09T15:44:24+00:00May 9, 2024|

AI Prompt Injection

In recent years, the rise of Artificial Intelligence (AI) has been nothing short of remarkable. Among the various applications of AI, chatbots have become prominent tools in customer service, support, and various other [...]

By |2023-11-03T15:05:33+00:00November 3, 2023|

Pwn2Own – When The Latest Firmware Isn’t

For the second year running, LRQA Nettitude took part in the well-known cyber security competition Pwn2Own, held in Toronto last week. This competition involves teams researching certain devices to find and exploit vulnerabilities. [...]

By |2023-11-01T12:32:20+00:00November 1, 2023|

Introducing Process Hiving & RunPE

Download our whitepaper and tool This blog is a condensed version of a whitepaper we've released, called "Process Hiving".  It comes with a new tool too, "RunPE".  You can download these at [...]

By |2021-11-15T20:47:31+00:00September 2, 2021|
Go to Top