|
You are here |
www.willsroot.io | ||
| | | | |
www.hackthebox.com
|
|
| | | | | FizzBuzz101 shares his clever exploits for this year's Uni CTF Stream Driver Hard Pwnable | |
| | | | |
mdanilor.github.io
|
|
| | | | | A beginers guide into a Linux Kernel stack overflow vulnerability. | |
| | | | |
dayzerosec.com
|
|
| | | | | Over the past few weeks, those of you who frequent the DAY[0] streams over on our Twitch may have seen me working on trying to understand the recent Android Binder Use-After-Free (UAF) published by Google's Project Zero (p0). This bug is actually not new, the issue was discovered and fixed in the mainline kernel in February 2018, however, p0 discovered many popular devices did not receive the patch downstream. Some of these devices include the Pixel 2, the Huawei P20, and Samsung Galaxy S7, S8, | |
| | | | |
idea.popcount.org
|
|
| | | [AI summary] The article discusses SipHash, a new cryptographic hash function designed to prevent hash flooding attacks, with examples of its implementation in Python and C. | ||