Multiple vulnerabilities in Yealink device management platform allow an unauthenticated attacker to run arbitrary commands on the server with root privileges - SSD Secure Disclosure Advisory
2021-02-25 19:45:31 •
阅读 15 •
点我收藏
|
A weekly security recap: The critical VMware flaw, Clubhouse app eavesdropping, SimpliSafe Alarm System hack, NK Cryptocurrency theft
2021-02-25 18:03:14 •
阅读 18 •
点我收藏
|
Exploiting (and Patching) a Zero Day RCE Vulnerability in a Western Digital NAS
2021-02-25 18:03:14 •
阅读 17 •
点我收藏
|
Exploiting a denial of service exploit in the ASM Java classfile parser
2021-02-25 11:11:13 •
阅读 24 •
点我收藏
|
SWD – ARM’s alternative to JTAG
2021-02-25 09:31:45 •
阅读 25 •
点我收藏
|
The trading market used for almost every Cities: Skylines interaction
2021-02-25 06:13:32 •
阅读 23 •
点我收藏
|
Malware Analysis Introduction | TryHackMe MAL: Malware Introductory
2021-02-25 02:53:25 •
阅读 30 •
点我收藏
|
Help me figure out how to reverse engineer the “Shining Mask” app to display custom video - Lumen Couture LED Face Changing Mask
2021-02-24 19:59:37 •
阅读 28 •
点我收藏
|
Reverse Engineering the Motorola MC14500 1-bit CPU
2021-02-24 16:32:29 •
阅读 27 •
点我收藏
|
Reverse Engineering with Radare2 | TryHackMe Reverse-Elf-ineering Advent of Cyber
2021-02-23 18:38:15 •
阅读 32 •
点我收藏
|
Windows RAT Written in Java --> Fully undetectable
2021-02-23 15:15:58 •
阅读 40 •
点我收藏
|
McAfee ATR CTF 2021 Writeup
2021-02-23 13:36:20 •
阅读 39 •
点我收藏
|
DC540 Hacking Challenge 0x00001
2021-02-23 08:41:42 •
阅读 28 •
点我收藏
|
Offensive Windows IPC Internals 2
2021-02-22 21:16:20 •
阅读 34 •
点我收藏
|
Let’s know How I have explored the buried secrets in Xamarin application
2021-02-22 21:16:20 •
阅读 41 •
点我收藏
|
/r/ReverseEngineering's Weekly Questions Thread
2021-02-22 17:58:59 •
阅读 30 •
点我收藏
|
Arbitrary Code Execution Proof of Concept in Paper Mario
2021-02-22 17:58:59 •
阅读 25 •
点我收藏
|
2021 NDSS Binary Analysis Research Workshop: Papers & Source Code
2021-02-22 06:28:14 •
阅读 38 •
点我收藏
|
Exploiting JWT key confusion attack without public RSA key - Cr0wnAir Web Challenge - Union CTF
2021-02-22 04:50:47 •
阅读 46 •
点我收藏
|
UPX anti-unpacking techniques in IoT malware
2021-02-21 20:35:28 •
阅读 35 •
点我收藏
|
ScanLime: Reverse Engineering an Active Styl
2021-02-21 04:01:04 •
阅读 37 •
点我收藏
|
Obfvious - a CLang (v 12) based compiler that allows for Windows binaries obfuscation [WiP]
2021-02-21 02:21:15 •
阅读 33 •
点我收藏
|
Reverse engineering the SARS-CoV-2 vaccine source code [Animated with permission from OP]
2021-02-20 19:37:41 •
阅读 45 •
点我收藏
|
Unknown (and unemulated) internal ROM inside SEGA's SVP chip [i.e. enhancement chip in Virtua Racing Sega Genesis 3D game cart]
2021-02-20 14:37:05 •
阅读 37 •
点我收藏
|
BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-Program Path Sampling and Per-Path Abstract Interpretation [PDF]
2021-02-20 11:19:25 •
阅读 29 •
点我收藏
|
Reversing a third-party closed-source application to add additional security features.
2021-02-20 06:24:40 •
阅读 34 •
点我收藏
|
Fun reverse engineering on the MSX to trigger easter eggs in a game
2021-02-20 03:09:09 •
阅读 40 •
点我收藏
|
ImHex 1.7.0 : Light mode, Node data processor, custom encodings and more
2021-02-19 04:09:38 •
阅读 33 •
点我收藏
|
Getting Information Disclosure in Adobe Reader Through the ID Tag
2021-02-19 04:09:38 •
阅读 37 •
点我收藏
|
When you go fighting malware don´t forget your VT plugins - Register For Free!
2021-02-19 00:55:15 •
阅读 36 •
点我收藏
|