Explore >> Select a destination


You are here

github.blog
| | comsecuris.com
3.4 parsecs away

Travel
| |
| | blog.quarkslab.com
3.7 parsecs away

Travel
| | Following our presentation at Black Hat USA, in this blog post we provide some details on CVE-2022-20233, the latest vulnerability we found on Titan M, and how we exploited it to obtain code execution on the chip.
| | docfate111.github.io
2.4 parsecs away

Travel
| |
| | malwaretech.com
24.5 parsecs away

Travel
| Today during RSA Conference, the National Security Agency release their much hyped Ghidra reverse engineering toolkit. Described as "A software reverse engineering (SRE) suite of tools", Ghidra sounded like some kind of disassembler framework.Prior to release, my expectation was something more than Binary Ninja, but lacking debugger integration. I figured the toolkit would be ideal for those interested in reversing, but who lack the funding for an IDA licence.