|
You are here |
hernan.de | ||
| | | | |
www.riscure.com
|
|
| | | | | In this series of blog posts about Samsung's TEE OS we identify vulnerabilities in tee security and show how to exploit them. | |
| | | | |
blog.lizzie.io
|
|
| | | | | ||
| | | | |
klecko.github.io
|
|
| | | | | This post aims at giving an overview of what SELinux is, how it is implemented, and how to bypass it, from the point of view of Android kernel exploitation. | |
| | | | |
blog.talosintelligence.com
|
|
| | | Talos also discovered a new PowerShell command-line argument embedded in the LNK file to bypass anti-virus products and download the final payload into the victims' host. | ||