Foundry Zero reposted this
We had a great time talking about QR codes at the Ladies of Cheltenham Hacking Society meetup last night! Thanks to everyone who got stuck in with both the learning and the colouring in 😄
We're a specialised supplier providing cyber security research, engineering services and training.
External link for Foundry Zero
Cheltenham, GB
Foundry Zero reposted this
We had a great time talking about QR codes at the Ladies of Cheltenham Hacking Society meetup last night! Thanks to everyone who got stuck in with both the learning and the colouring in 😄
We had a great time talking about QR codes at the Ladies of Cheltenham Hacking Society meetup last night! Thanks to everyone who got stuck in with both the learning and the colouring in 😄
Thrilled to have been at the CyberFirst Careers Fair yesterday, connecting with the next generation of tech talent! It was exciting to chat about our graduate roles and summer placements and to see so many young people passionate about a future in cyber security. Our stall was busy from open to close — although, I suspect the socks might have helped a bit too! 🧦 Looking forward to seeing these bright minds shape the future of cyber! #CyberFirst #CyberSecurity #TechCareers #GraduateOpportunities #FutureTalent #CareerFair
🎉 What an incredible training year it's been for the team! We've sent our people to some of the best conferences in the industry, including: ✨ DEFCON - Vegas ✨ OffensiveCon - Berlin ✨ RECON - Montreal ✨ hardwear - Santa Clara ✨ CPPCon - Folkeston (supporting local conferences 👏) ✨ Ringzer0 - Cyberspace? 🌐 And to cap it all off, we're excited to close out the year with a full company trip to Hexacon! Can't wait to bring the entire team together, soak in some great talks, and learn from the best. 🚀 #CyberSecurity #TechConference #TeamTraining #GrowthMindset #Hexacon #DEFCON #OffensiveCon #Recon #Hardwear #CPPCon #Ringzer0 #ContinuousLearning #Teamwork
TL;DR We've released a new tool called "Ghidra Angr Integration Toolkit" to aid with using Angr and Ghidra together. You can find the blog here: https://lnkd.in/eKHtmDUp and the tool here: https://lnkd.in/ecdqrcK4 Symbolic execution is an incredibly powerful binary analysis technique, where the program (or parts of it) are simulated under a specific environment that provides a deep understanding of how inputs to the program affect both the behavior and any outputs. Unfortunately, most of the tools for applying it are complex, and take a while to correctly setup and get working on a given project. To help fix this, we created AngrIntegration, a Ghidra plugin that integrates the popular symbolic execution suite angr. You can symbolically execute any architecture that Ghidra can load, using the same pcode representation that Ghidra uses internally! Using the plugin, most aspects of angr can be controlled using the GUI, and if any more advanced functionality is needed, there are python hooks that allow you to customise aspects of how symbolic execution occurs. We hope that this will help people with debugging and reverse engineering. #Ghidra #Angr #ReverseEngineering #Cybersecurity #BinaryAnalysis #SymbolicExecution
You’re looking for real-world experience. Professional connections. A path into cyber security. We’re looking for students who identify as a woman, who are applying to university in 2025, or in their first year. With our CyberFirst University Bursary, you could get up to £24K in funding, no matter what you’re studying. And the chance to work with industry leaders each summer. And the opportunity to explore tech and non-tech career paths. All within a supportive community. Attend our upskilling events and we’ll give you all the tips you need to apply. Register your interest and sign up now⬇️ https://lnkd.in/e5vrCd7i
We’re really proud partners of the CyberFirst University Bursary, that’s helping break down barriers to get more women into tech. So, if you’re a student who identifies as a woman applying to university in 2025 (or in your first year), you could get up to £24K in funding, and the chance to work with some of the biggest names in tech each summer. You’ll make professional connections, try new things, and build loads of new skills and confidence, regardless of what you study. It’s a unique opportunity to uncover a tech career and be part of a supportive community. Register your interest today: https://lnkd.in/e5vrCd7i
Apply for our CyberFirst University Bursary, and you could get up to £24K in funding, regardless of what you study. You’ll explore a fast-growing cyber security industry and a faster growing range of tech and non-tech career opportunities, all while getting support to build new skills and confidence. More gender diversity in cyber means breaking down the barriers women face. So, if you identify as a woman, and are applying to university in 2025, or in the first year of your degree, come along to one of our upskilling events and we’ll give you everything you need to make the most of your application. Register your interest and sign up here: https://lnkd.in/e5vrCd7i
TL;DR we released a new tool that helps find non-standard strings in binaries, find the blog here: https://lnkd.in/eVMg4Hqs and the tool here: https://lnkd.in/eePBWNQu We at Foundry Zero like to identify and fix the problems that we encounter on a daily basis because we assume that everyone else is encountering them too. Obviously we could do broader market research but this seems like the most efficient path. A consistent problem we encounter is "non-standard strings" or stack strings. Thanks to compilers being compilers, or deliberate obfuscation, it is not uncommon for strings to be stored across instruction immediates rather than nicely all in one piece. These strings can then be rebuilt on the stack at runtime (hence the name) but may also be constructed elsewhere or only compared against other variables and not directly touch other memory locations. This makes finding the strings difficult, and reverse-engineering tools like Ghidra often present you with a long string of hex that’s hard to read and harder to search for. So we bring you Stack String Explorer. It's a tool that emulates code that contains ascii-looking hex values to identify how they're munged and spits out trackable strings with XRefs. #foundryzero #Ghidra #reverseengineering #binaryanalysis #cybersecurity #softwareengineering #foss
We're always on the lookout for experienced low-level cyber researchers and developers. If you feel like it's time for a change, and you want to be somewhere you can focus on doing great work without processes, meetings and emails getting in the way, then get in touch 🙂 https://lnkd.in/efvjDyF3