ARM Exploit Exercises

Overview A while ago, a compiled all of the stack exercises from the Exploit Exercises Protostar series and dumped them on Github. I like to practice exploitation on ARM a lot, because architecture wise it is where I spend most of my time. After running through all of the Protostar…

Objective-C Instrumentation with Frida

Overview A friend recently asked for help with using Frida to instrument applications written in Objective-C, so I thought I would shared the brief tutorial I walked him through. Frida is a very powerful cross-platform instrumentation toolkit. For those who are not familiar with what Frida is and what it…

LifeForm Labs | A Collective

The Beginning I love mobile and embedded security research. It's something that I am truly passionate about. I've always had this dream of building something where really bright individuals across these industries who are equally as passionate, can come and work on research projects together. So in January of this…

Swift Reverse Engineering | Digging into Objects

Overview With absolutely zero experience reverse engineering any Swift binaries, this post will begin my personal exploration and maybe yours as well, into the internals of the Swift language and how to make sense of things down in its disassembled world Swift Objects I created a simple Swift iOS application…

Introduction to Lobotomy | Part Two

Overview In Part One we discovered how to load applications into Lobotomy, and how Lobotomy's global loader works as a whole. In Part Two we are going to cover how to use Lobotomy for APK decompilation and how to convert non-debuggable Android applications into being debuggable Android applications. APK Decompilation…

Introduction to Lobotomy | Part One

Overview In this blog series we will be covering the many different features that Lobotomy boasts, and how to use them when assessing and reverse engineering Android applications. Loading Up Lobotomy was designed to give a user the ability to seamlessly load an Android application into its console environment, and…