You are here |
blog.pkh.me | ||
| | | |
tcode2k16.github.io
|
|
| | | | a random blog about cybersecurity and programming | |
| | | |
tcode2k16.github.io
|
|
| | | | a random blog about cybersecurity and programming | |
| | | |
goggleheadedhacker.com
|
|
| | | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | |
| | | |
williamdurand.fr
|
|
| | I wrote a [Twitter thread about hardware hacking]1 some time ago. The idea was to explain one way to obtain privileged access on a device. In this case, the target was a cheap Chromecast-like device (more on that below) and I "easily" got root access via UART. This used to be a link to a Twitter thread from me. I? |