Explore >> Select a destination


You are here

tyrrrz.me
| | parsiya.net
6.4 parsecs away

Travel
| | [AI summary] The provided text is a detailed technical article discussing various methods and techniques for exploiting custom protocol handlers and command-line switches in applications. It covers topics such as UNC path injection, command-line switch abuse, remote file execution, and leveraging startup directories for persistence. The article also includes practical examples, tools like Nirsoft's URLProtocolView, and advice on how to discover and exploit vulnerabilities in applications.
| | bibwild.wordpress.com
6.8 parsecs away

Travel
| | We are a small independent academic institution, that hosts a "digital collections" of digitized historical materials, on the web, using a custom in-house Rails app. We're getting into including some historical video content for the first time, and I didn't have much experience with video, it required me to figure outa few things, that I'm...
| | comsecuris.com
9.6 parsecs away

Travel
| | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms.
| | vincent.bernat.ch
48.3 parsecs away

Travel
| This has been several months since I didn't use much my laptop, an Asus S5N: it was crippled by a short battery life and was hit by several bugs,...