|
You are here |
cocomelonc.github.io | ||
| | | | |
wsummerhill.github.io
|
|
| | | | | Malware Development Introduction (aka Malware Dev 101), Part 1 | |
| | | | |
www.da.vidbuchanan.co.uk
|
|
| | | | | [AI summary] A detailed writeup of a cryptographic side-channel attack challenge from the UofTCTF where the author exploits timing variations in an AES decryption implementation to recover the flag. | |
| | | | |
goggleheadedhacker.com
|
|
| | | | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | |
| | | | |
www.uptycs.com
|
|
| | | In the latest 2023 cyber security threat report, Uptycs saw a significant increase in the sophistication and complexity of threats faced by organizations globally. | ||