ajte0gK4IqIGMcYo8eqW's Likes
Unveiling RIFT: Enhancing Rust malware analysis through pattern matching
🦠Malware Analysis
Flag this post
The Journey of Bypassing Ubuntu’s Unprivileged Namespace Restriction
📦Container Security
Flag this post
IDGraphs: Intrusion Detection and Analysis Using Stream Compositing
arxiv.org·18w
🌐Network Security
Flag this post
4 Powerful Applications of IDALib: Headless IDA in Action
hex-rays.com·18w
🔍Reverse Engineering
Flag this post
Out-of-Band, Part 1: The new generation of IP KVMs and how to find them
🤖Embedded Security
Flag this post
Two Bugs, One Func(), part three
objective-see.org·20w
💥Binary Exploitation
Flag this post
A IP security protection package for Go
🌐Network Security
Flag this post
CVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage
research.checkpoint.com·20w
🌍Browser Exploits
Flag this post
Another Crack in the Chain of Trust: Uncovering (Yet Another) Secure Boot Bypass
🥾Bootloader Security
Flag this post
USE-AFTER-FREE VULNERABILITY IN CAN BCM SUBSYSTEM LEADING TO INFORMATION DISCLOSURE (CVE-2023-52922)
💥Binary Exploitation
Flag this post
runZero Loves Open Source: Integrating Nuclei
runzero.com·20w
🔱FreeBSD Security
Flag this post
Bypassing the Renesas RH850/P1M-E read protection using fault injection
🔌Hardware Debugging
Flag this post
Red Team & Adversarial Emulation Solution Brief
bishopfox.com·20w
🎯Red Team
Flag this post
Loading...Loading more...