Why are Frida and QBDI a Great Blend on Android?
Introduction Reverse engineering of Android applications is usually considered as somewhat effortless because of the possibility of retrieving the Java
Read moreIntroduction Reverse engineering of Android applications is usually considered as somewhat effortless because of the possibility of retrieving the Java
Read morePart 1: Detailed overview of Samsung’s TrustZone components Part 2: Tools development for reverse-engineering and vulnerability research Part 3: Vulnerability
Read moreAs you may have read in our previous blog post, the release of Triton v0.8 came with a lot of
Read moreIntroduction Fuchsia is a new operating system developed by Google, targeting the AArch64 and x86_64 architectures. While little is known
Read moreIntroduction Ansible [1] is an open-source software that automates configuration management and software deployment. If you’re not familiar with Ansible,
Read moreContext Quarkslab is one of the 10 ITSEF (Information Technology Security Evaluation Facility, CESTI in French) licensed by the ANSSI’s
Read moreIntroduction Embedded devices are a huge and wide world of options for CPU architectures, operating systems and file systems. You
Read moreWe are pleased to announce that we released Triton v0.8 under the terms of the Apache License 2.0 (same license
Read moreIntroduction In March 2020, Google patched a critical vulnerability affecting many MediaTek based devices [1]. This vulnerability had been known
Read moreIntroduction Welcome to the final chapter of the Trimedia series. In the first part of the series, I introduced this
Read moreIntroduction After detailing Samsung’s TrustZone implementation in the first part of this series, this blog post introduces the tools that
Read moreMotivations After a general introduction on the ARM TrustZone and a focus on Qualcomm’s implementation, this new series of articles
Read moreIntroduction This blog post deals with the Legu packer, an Android protector developed by Tencent that is currently one of
Read moreIntroduction Irma is our file security analysis software, originally developed as an open source project with the sponsorship of 5
Read more