![]() ![]() HITB Phuket 2023 – Exploiting the Lexmark PostScript Stack.From ERMAC to Hook: Investigating the technical differences between two Android malware variants.On Multiplications with Unsaturated Limbs.Introduction to AWS Attribute-Based Access Control.Public Report – Caliptra Security Assessment.Public Report – Zcash FROST Security Assessment. ![]() Unveiling the Dark Side: A Deep Dive into Active Ransomware Families.Technical Advisory: Insufficient Proxyman HelperTool XPC Validation.Popping Blisters for research: An overview of past payloads and exploring recent developments.D0nut encrypt me, I have a wife and no backups.Post-exploiting a compromised etcd – Full control over the cluster and its nodes. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |