Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2023.06.03.md
ROP Exploits - https://pop.rdi.sh/rop-exploits/
Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1) - https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html
Daxin Backdoor: In-Depth Analysis, Part One - https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-malware-espionage-analysis
The ARM32 Scheduling and Kernelspace/Userspace Boundary - https://people.kernel.org/linusw/the-arm32-scheduling-and-kernelspace-userspace-boundary
RISC-V Bytes: Exploring a Custom ESP32 Bootloader - https://danielmangum.com/posts/risc-v-bytes-exploring-custom-esp32-bootloader/
#informatyka
ROP Exploits - https://pop.rdi.sh/rop-exploits/
Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1) - https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html
Daxin Backdoor: In-Depth Analysis, Part One - https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-malware-espionage-analysis
The ARM32 Scheduling and Kernelspace/Userspace Boundary - https://people.kernel.org/linusw/the-arm32-scheduling-and-kernelspace-userspace-boundary
RISC-V Bytes: Exploring a Custom ESP32 Bootloader - https://danielmangum.com/posts/risc-v-bytes-exploring-custom-esp32-bootloader/
#informatyka
Zaloguj się aby komentować