garble
src
Our great sponsors
garble | src | |
---|---|---|
6 | 745 | |
3,518 | 3,041 | |
4.8% | 1.6% | |
8.4 | 10.0 | |
about 2 months ago | 4 days ago | |
Go | C | |
BSD 3-clause "New" or "Revised" License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
garble
- Obfuscate Go Builds
-
SSHD: Random boot time relinking, OpenBSD
Yes, the base idea is not that new. I store since years every GO based application I use as small (few kb) source code tree checkout only, no binary at all. At runtime the wrapper compiles a randomized individual one-time-temporary-uniq binary via garble [0].
[0] https://github.com/burrowers/garble
- Reverse engineering executable
-
I built SafeHODL on Golang: A safe way to track your Bitcoin holdings value from the terminal
You're right. After thinking about it I finally understand that shouldn't embed the AES secret key and access pin code in cleartext into the binary, even if it's going to be obfuscated using [Garble](https://github.com/burrowers/garble). I didn't even hash encrypted them for further hash comparison, so it's very stupid of me.
- Our Github actions got abused for mining Monero today, anyone experienced sth. similar?
- Reversing Go - Part 1
src
-
OpenBSD Upgrade 7.3 to 7.4
The OpenBSD project released 7.4 of their OS on 16 Oct 2023 as their 55th release đ«
-
OpenBSD System-Call Pinning
Well since https://www.openbsd.org/ still says
> Only two remote holes in the default install, in a heck of a long time!
I'm assuming not, but I could always be mistaken.
- Project Bluefin: an immutable, developer-focused, Cloud-native Linux
-
From Nand to Tetris: Building a Modern Computer from First Principles
> building a cat from scratch
> That would be an interesting project.
Here is the source code of the OpenBSD implementation of cat:
> https://github.com/openbsd/src/blob/master/bin/cat/cat.c
and here of the GNU coreutils implementation:
> https://github.com/coreutils/coreutils/blob/master/src/cat.c
Thus: I don't think building a cat from scratch or creating a tutorial about that topic is particularly hard (even though the HN audience would likely be interested in it). :-)
-
OpenBSD â pinning all system calls
> I don't know how they define `MAX`, but I'm guessing it's a typical "a>b?a:b"
Indeed: https://github.com/openbsd/src/blob/master/sys/sys/param.h#L...
> Then `SYS_kbind` seems to be a signed int.
It's an untyped #define: https://github.com/openbsd/src/blob/master/sys/sys/syscall.h...
I believe your whole analysis is correct, that running an elf file with an openbsd.syscalls entry with .sysno > INT_MAX will allow an out-of-bounds write.
- Une nouvelle mise à jour de Systemd permettra à Linux de bénéficier de l'infùme "écran bleu de la mort" de Windows, mais la fonctionnalité a reçu un accueil trÚs mitigé
-
tmux causing ANSI color-response garbage on attaching?
I can reproduce it. And this is the commit that causes the issue: https://github.com/openbsd/src/commit/d21788ce70be80e9c4ed0c52c149e01147c4a823
-
Sudo-rs' first security audit
This doesnât really change your conclusion, but I think thatâs the wrong file. This is the real doas afaict: https://github.com/openbsd/src/blob/master/usr.bin/doas/doas...
Still just a tidy 1072 lines in that folder though.
I spent 5 minutes staring at your file trying to understand how on earth it does the things in the man page, but of course it doesnât.
-
OpenBSD: Removing syscall(2) from libc and kernel
OpenBSD developers are making serious effort to kill off indirect syscalls, the base system is completely clean, take a look at the work Andrew Fresh did to adapt Perl. He write a complete syscall "dispatcher" or emulator for the Perl syscall function so that it calls the libc stubs.
https://github.com/openbsd/src/commit/312e26c80be876012ae979...
The ports tree is also being cleansed of syscall(2) usage, until they're all gone.
msyscall, pinsyscall, recent mandatory IBT/BTI, xonly. OpenBSD is making waves, but people aren't really seeing them yet.
-
"<ESC>[31M"? ANSI Terminal security in 2023 and finding 10 CVEs
Actually, I got it wrong, too many vulnerabilities in flight. They did fix it: https://github.com/openbsd/src/commit/375ccafb2eb77de6cf240e...
What are some alternatives?
go - The Go programming language
cosmopolitan - build-once run-anywhere c library
appify - Create a macOS Application from an executable (like a Go binary)
bastille - Bastille is an open-source system for automating deployment and management of containerized applications on FreeBSD.
Glyph - An architecture independent binary analysis tool for fingerprinting functions through NLP
buttersink - Buttersink is like rsync for btrfs snapshots
gpg - A client to gpg-agent for Go
PHPT - The PHP Interpreter
wled-backup - Simple CLI tool to backup presets & configuration from a WLED device
Joomla! - Home of the Joomla! Content Management System
safehodl - Track your Bitcoin holdings value safely from your terminal đ
ctl - The C Template Library