Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2023.01.01.md
Reversing embedded device bootloader (U-Boot) - p.1 - https://www.shielder.com/blog/2022/03/reversing-embedded-device-bootloader-u-boot-p.1/
[Linux Kernel Exploitation 0x2] Controlling RIP and Escalating privileges via Stack Overflow - https://blog.k3170makan.com/2021/01/linux-kernel-exploitation-0x2.html
Invoke a remote command without WinRM, psexec or similar – Access administrative shares even if they have been removed - https://maikkoster.com/invoke-a-remote-command-without-winrm-psexec-or-similar-access-administrative-shares-even-if-they-have-been-removed/
From Self-Hosted GitHub Runner to Self-Hosted Backdoor - https://www.praetorian.com/blog/self-hosted-github-runners-are-backdoors/
Reverse Engineering Rustlang Binaries - A Series - https://brightprogrammer.netlify.app/post/reverse-engineering-rustlang-binaries-0x1-empty-program/
Reversing embedded device bootloader (U-Boot) - p.1 - https://www.shielder.com/blog/2022/03/reversing-embedded-device-bootloader-u-boot-p.1/
[Linux Kernel Exploitation 0x2] Controlling RIP and Escalating privileges via Stack Overflow - https://blog.k3170makan.com/2021/01/linux-kernel-exploitation-0x2.html
Invoke a remote command without WinRM, psexec or similar – Access administrative shares even if they have been removed - https://maikkoster.com/invoke-a-remote-command-without-winrm-psexec-or-similar-access-administrative-shares-even-if-they-have-been-removed/
From Self-Hosted GitHub Runner to Self-Hosted Backdoor - https://www.praetorian.com/blog/self-hosted-github-runners-are-backdoors/
Reverse Engineering Rustlang Binaries - A Series - https://brightprogrammer.netlify.app/post/reverse-engineering-rustlang-binaries-0x1-empty-program/
@konik_polanowy
Reversing embedded device bootloader
jezu jak ja uwielbiam takie case studies z rana
Zaloguj się aby komentować