sukelluskello.bsky.social
Seeds are generally preferable to expanded keys because they are smaller and don't require validation. Having one key format is VASTLY preferable to having two.
Seeds are generally preferable to expanded keys because they are smaller and don't require validation. Having one key format is VASTLY preferable to having two.
White paper link: act-on.ioactive.com/acton/attach...
#automotive #cybersecurity
White paper link: act-on.ioactive.com/acton/attach...
#automotive #cybersecurity
Reverse engineering the runtime code integrity protection of Call of Duty: Black Ops 3
web.archive.org/web/20230522...
#reverseengineering #infosec
Reverse engineering the runtime code integrity protection of Call of Duty: Black Ops 3
web.archive.org/web/20230522...
#reverseengineering #infosec
syst3mfailure.io/wall-of-perd...
willsroot.io/2021/08/corc...
#Linux #cybersecurity
syst3mfailure.io/wall-of-perd...
willsroot.io/2021/08/corc...
#Linux #cybersecurity
embeddedsecurity.io
#trustzone #infosec
embeddedsecurity.io
#trustzone #infosec
conference.hitb.org/files/hitbse...
#sonos #cybersecurity
conference.hitb.org/files/hitbse...
#sonos #cybersecurity
Part 1: intezer.com/blog/researc...
Part 2: intezer.com/blog/malware...
Part 3: intezer.com/blog/malware...
Part 4: intezer.com/blog/malware...
#elf #cybersecurity
Part 1: intezer.com/blog/researc...
Part 2: intezer.com/blog/malware...
Part 3: intezer.com/blog/malware...
Part 4: intezer.com/blog/malware...
#elf #cybersecurity
blogs.vmware.com/security/202...
#cybersecurity #Windows
blogs.vmware.com/security/202...
#cybersecurity #Windows
Ghidra setup: voidstarsec.com/blog/ghidra-...
Tools: voidstarsec.com/blog/intro-t...
Firmware extraction: voidstarsec.com/blog/uart-ub...
#reverseengineering #cybersecurity
Ghidra setup: voidstarsec.com/blog/ghidra-...
Tools: voidstarsec.com/blog/intro-t...
Firmware extraction: voidstarsec.com/blog/uart-ub...
#reverseengineering #cybersecurity
Part 1: mdanilor.github.io/posts/hevd-0/
Part 2: mdanilor.github.io/posts/hevd-1/
Part 3: mdanilor.github.io/posts/hevd-2/
Part 4: mdanilor.github.io/posts/hevd-3/
Part 5: mdanilor.github.io/posts/hevd-4/
#windows #infosec
Part 1: mdanilor.github.io/posts/hevd-0/
Part 2: mdanilor.github.io/posts/hevd-1/
Part 3: mdanilor.github.io/posts/hevd-2/
Part 4: mdanilor.github.io/posts/hevd-3/
Part 5: mdanilor.github.io/posts/hevd-4/
#windows #infosec
0x434b.dev/overview-of-...
#glibc #cybersecurity
0x434b.dev/overview-of-...
#glibc #cybersecurity
1. Connection: timleonard.uk/2022/05/29/r...
2. Packets: timleonard.uk/2022/06/02/r...
3. Key exchange: timleonard.uk/2022/06/03/r...
4. Reliable UDP: timleonard.uk/2022/06/09/r...
#networking #reverseengineering
1. Connection: timleonard.uk/2022/05/29/r...
2. Packets: timleonard.uk/2022/06/02/r...
3. Key exchange: timleonard.uk/2022/06/03/r...
4. Reliable UDP: timleonard.uk/2022/06/09/r...
#networking #reverseengineering