Explore >> Select a destination


You are here

secret.club
| | decoded.avast.io
5.5 parsecs away

Travel
| | Zero-Day Exploit Powers Advanced Rootkit
| | blog.quarkslab.com
5.2 parsecs away

Travel
| | In this first article of a series of three, we will give a tour of the different components of Samsung's TrustZone, explain how they work and how they interact with each other.
| | prog.world
4.9 parsecs away

Travel
| | [AI summary] The article discusses the use of Intel Processor Trace (PT) technology to capture code traces from the System Management Mode (SMM) in a computer's BIOS. The authors detail the process of creating a backdoor to access SMM, modifying the SMI dispatcher to redirect execution to a custom shellcode, and using tools like WinIPT and ptxed to analyze the trace data. They also mention challenges such as synchronization issues and the need for cross-platform compatibility, and conclude that this method provides an efficient way to investigate SMM code for vulnerabilities.
| | dateo-software.de
32.2 parsecs away

Travel
| Coding, Tech and Developers Blog