Grand Theft Auto A peek of BLE relay attack - https://rollingpwn.github.io/BLE-Relay-Aattck/
Reverse Engineering Android Apps to Bypass Root Detection Capabilities - https://www.nowsecure.com/blog/2023/03/01/reverse-engineering-android-apps-to-bypass-root-detection-capabilities/
Intro to Embedded RE Part 1: Tools and Series - https://voidstarsec.com/blog/intro-to-embedded-part-1
Forwarding Traffic Through SSH - https://www.blackhillsinfosec.com/forwarding-traffic-through-ssh/
Networking Pivoting via SSH – Scanning with Nessus Professional behind a Firewall or NAT - https://www.adamcouch.co.uk/networking-pivoting-via-ssh-scanning-with-nessus-behind-a-firewall-or-nat/
#informatyka
Zaloguj się aby komentować