ajte0gK4IqIGMcYo8eqW's Likes

Bouncing on trampolines to run eBPF programs
bootlin.com·12w·
Discuss: Hacker News
🐧eBPF Kernels
Flag this post
Introducing luzer, a coverage-guided Lua fuzzing engine
bronevichok.ru·12w·
🐛Fuzzing
Flag this post
Part 1: A Deep Dive into Rust and C Memory Interoperability
notashes.me·12w·
🏷️Memory Tagging
Flag this post
Unveiling RIFT: Enhancing Rust malware analysis through pattern matching
microsoft.com·18w·
Discuss: Hacker News
🦠Malware Analysis
Flag this post
The Journey of Bypassing Ubuntu’s Unprivileged Namespace Restriction
u1f383.github.io·18w·
📦Container Security
Flag this post
IDGraphs: Intrusion Detection and Analysis Using Stream Compositing
arxiv.org·18w
🌐Network Security
Flag this post
Understanding Network Packet Offsets and Safe Parsing in eBPF
diobr4nd0.github.io·18w·
Discuss: Hacker News
📈XDP Networking
Flag this post
4 Powerful Applications of IDALib: Headless IDA in Action
hex-rays.com·18w
🔍Reverse Engineering
Flag this post
Out-of-Band, Part 1: The new generation of IP KVMs and how to find them
runzero.com·18w·
Discuss: Hacker News
🤖Embedded Security
Flag this post
Two Bugs, One Func(), part three
objective-see.org·20w
💥Binary Exploitation
Flag this post
A IP security protection package for Go
github.com·20w·
Discuss: r/golang
🌐Network Security
Flag this post
CVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage
research.checkpoint.com·20w
🌍Browser Exploits
Flag this post
Another Crack in the Chain of Trust: Uncovering (Yet Another) Secure Boot Bypass
binarly.io·20w·
Discuss: Hacker News
🥾Bootloader Security
Flag this post
USE-AFTER-FREE VULNERABILITY IN CAN BCM SUBSYSTEM LEADING TO INFORMATION DISCLOSURE (CVE-2023-52922)
allelesecurity.com·20w·
💥Binary Exploitation
Flag this post
Mixed Boolean-Arithmetic (part 1): Introduction
plzin.github.io·20w·
🔐Cryptography
Flag this post
Patterns for Modeling Overlapping Variant Data in Rust
mcmah309.github.io·20w·
🐛Fuzzing
Flag this post
Key insights from implementing zk-SNARK from scratch
dev.to·20w·
Discuss: DEV
🔐Cryptography
Flag this post
runZero Loves Open Source: Integrating Nuclei
runzero.com·20w
🔱FreeBSD Security
Flag this post
Bypassing the Renesas RH850/P1M-E read protection using fault injection
icanhack.nl·20w·
🔌Hardware Debugging
Flag this post
Red Team & Adversarial Emulation Solution Brief
bishopfox.com·20w
🎯Red Team
Flag this post