Microsoft BitLocker Bypasses are Practical - https://blog.compass-security.com/2024/02/microsoft-bitlocker-bypasses-are-practical/
Reverse-engineering an encrypted IoT protocol - https://smlx.dev/posts/goodwe-sems-protocol-teardown/
L0: Let's learn Linux Kernel exploitation - part 1 https://therealcoiffeur.com/l0.html
Fuzzer Development: Sandboxing Syscalls - https://h0mbre.github.io/Lucid_Context_Switching/
Load-time relocation of shared libraries - https://eli.thegreenplace.net/2011/08/25/load-time-relocation-of-shared-libraries/
#informatyka
Zaloguj się aby komentować