|
You are here |
codecolor.ist | ||
| | | | |
jhftss.github.io
|
|
| | | | | This is a blog post for my presentation at the conference POC2024. The slides are uploaded here. | |
| | | | |
pewpewthespells.com
|
|
| | | | | ||
| | | | |
theevilbit.github.io
|
|
| | | | | TL;DR It works, but very limited due to heavy sandboxing, you can only read and copy files to your sandbox folder or consume some CPU power. If you have a way to escape sandbox then go for it, or could be used as part of a multi-part malware. Intro I'm reading Jonathan Levin's *OS Internals Vol I. book (user mode - *OS Internals: - Welcome!), and I got to the chapter where he talks about Spotlight importers, and my first thought was that it would be an awesome way to persist on macOS. | |
| | | | |
www.linux.it
|
|
| | | UPDATE: this post unexpectedly ended up on Hacker News and I received a lot of comments. The two most important points being made are (1) that Secure Boot on the RPi as ... | ||