- High-Level Approaches for Finding Vulnerabilities
-
Reverse Engineering & Exploitation of a “Connected Alarm Clock”
- “This article describes my journey into the Aura, from firmware image grabbing to remote buffer overflow exploitation.” - Detecting CrackMapExec (CME) with Bro, Sysmon, and Powershell logs
- An (un)documented Word feature abused by attackers
- How I hacked Google’s bug tracking system itself for $15,600 in bounties
- Defeating Google’s audio reCaptcha with 85% accuracy
- Analysing a Cryptocurrency phishing attack that earns $15K in two hours
- Hacking Cryptocurrency Miners with OSINT Techniques
- CryptoShuffler: Trojan stole $140,000 in Bitcoin
-
Linux kernel: multiple vulnerabilities in the USB subsystem
- should be fun to try… - Intel’s super-secret Management Engine firmware now glimpsed, fingered via USB
- YARA: The pattern matching swiss knife for malware researchers
- PoC||GTFO PASTOR LAPHROAIG RACES THE RUNTIME RELINKER
C410 A2BE CB73 EF77 746E 9682 E2C4 91CE D20D 800F