You are here |
www.jaybosamiya.com | ||
| | | |
mem2019.github.io
|
|
| | | | Recently, I have submitted my academic paper to NDSS 2025. Now it's time to take a break. Following the deadline is the HITCON CTF 2024, so as the break, why... | |
| | | |
landave.io
|
|
| | | | Blog about anti-virus software vulnerabilities. | |
| | | |
blog.flanker017.me
|
|
| | | | Recently as KASLR is slowly adopted into Android and because of the requirements of exploitation stability of previous bugs, kernel infoleak bugs are becoming more and more important. Here I want t... | |
| | | |
goggleheadedhacker.com
|
|
| | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. |