|
You are here |
sergioprado.blog | ||
| | | | |
prog.world
|
|
| | | | | [AI summary] This technical article details a research project from Summer Of Hack 2019 that utilized Intel Processor Trace hardware features to successfully record and analyze code execution paths within System Management Mode (SMM) on x86 processors, overcoming OS protection barriers to identify potential security vulnerabilities. | |
| | | | |
leezhenghui.github.io
|
|
| | | | | Table of Contents | |
| | | | |
www.collabora.com
|
|
| | | | | Interested in learning more about low-level specifics of the eBPF stack? Read on as we take a deep dive, from its VM mechanisms and tools, to running traces on remote, resource-constrained embedded devices. | |
| | | | |
elliott.diy
|
|
| | | How I found a RCE vulnerability in a privacy VPN. | ||