So which security considerations are relevant at an early stage?
- What security concerns were raised by customers willing to pay for your product?
- What are the security expectations in your industry (Medical, Finance, Enterprise)?
- What are the target market (country) regulations (Data Privacy, Data Residency)? Europeans are known to have tougher regulations. Different US States have different regulations.
- Which tools and policies would not hurt your team's morale.
- How long would it take you to prepare a security risk plan (see example at the bottom of this document)?
reverse - Reverse engineering for x86 binaries. Generation of pseudo-C.
A step-by-step account of an overnight digital heist
binglide - Visual reverse engineering tool showing some of the current techniques.
wifiphisher - Fast automated phishing attacks against WPA networks
Rekall Memory Forensic Framework
A month ago, I wanted to automate queries to a website that is using the PHPSESSID cookie to keep track of sessions. I struggled a lot and couldn't find any documentation covering the behaviour I was observing. But yesterday I finally found a solution !
In hope it could help others …
Consider the following Python expression:
print("".join(set("ABCDE")))
What do you think it produces ?
Not necessarily "ABCDE". Right, but you would expect the result to be consistent, isn't it ?
$ for i in {1..3}; do python2.7 -c 'print("".join(set("ABCDE")))'; done
ACBED
ACBED
ACBED
Great !
...
But with …
miasm - Reverse engineering framework in Python