Explore >> Select a destination


You are here

wiki.henkaku.xyz
| | docfate111.github.io
4.1 parsecs away

Travel
| |
| | blog.quarkslab.com
2.9 parsecs away

Travel
| | This third article from the Samsung's TrustZone series details some vulnerabilities that were found and how they were exploited to obtain code execution in EL3.
| | www.anvilsecure.com
3.0 parsecs away

Travel
| | I reversed the firmware of my Garmin Forerunner 245 Music back in 2022 and found a dozen or so vulnerabilities in their support for Connect IQ applications. They can be exploited...
| | reverse.put.as
31.1 parsecs away

Travel
| This is a guest post by a young and talented Portuguese exploiter, Federico Bento. He won this year's Pwnie for Epic Achievement exploiting TIOCSTI ioctl. Days ago he posted a video demonstrating an exploit for CVE-2017-5123 and luckly for you I managed to convince him to do a write-up about it. I hope you enjoy his work. Thanks Federico!