Angelin Booz さんがリポスト

📣 Announcing the tmp.0ut Volume 3 Call For Papers! For information on submission guidelines and ways to contact us, visit the CFP page: tmpout.sh/blog/vol3-cfp.…

tmpout's tweet image. 📣 Announcing the tmp.0ut Volume 3 Call For Papers!

For information on submission guidelines and ways to contact us, visit the CFP page: tmpout.sh/blog/vol3-cfp.…

Angelin Booz さんがリポスト

The Christmas open-obfuscator challenge is live at this address: obfuscator.re/challenges/ Thank you to @vector35 @build38dotcom and @eshard for sponsoring the prizes of this challenge.

rh0main's tweet image. The Christmas open-obfuscator challenge is live at this address:

obfuscator.re/challenges/

Thank you to @vector35 @build38dotcom and @eshard for sponsoring the prizes of this challenge.

Angelin Booz さんがリポスト

Le SSTIC aura lieu du 7 au 9 juin 2023. L'appel à contributions est en ligne: sstic.org/2023/cfp/. Date limite de soumission : 30 janvier. Vous hésitez ? Relisez nos conseils: blog.sstic.org/2017/01/06/com…


Angelin Booz さんがリポスト

Boot ROM authentication bypass and arbitrary code execution on the Starlink User Terminal using voltage fault injection Great work by @LennertWo GitHub: buff.ly/3gpX5ly Slides: buff.ly/3tOWCMQ #embedded #hardware #faultinjection #starlink #hacking #infosec

0xor0ne's tweet image. Boot ROM authentication bypass and arbitrary code execution on the Starlink User
Terminal using voltage fault injection
Great work by @LennertWo

GitHub: buff.ly/3gpX5ly
Slides: buff.ly/3tOWCMQ

#embedded #hardware #faultinjection #starlink #hacking #infosec
0xor0ne's tweet image. Boot ROM authentication bypass and arbitrary code execution on the Starlink User
Terminal using voltage fault injection
Great work by @LennertWo

GitHub: buff.ly/3gpX5ly
Slides: buff.ly/3tOWCMQ

#embedded #hardware #faultinjection #starlink #hacking #infosec
0xor0ne's tweet image. Boot ROM authentication bypass and arbitrary code execution on the Starlink User
Terminal using voltage fault injection
Great work by @LennertWo

GitHub: buff.ly/3gpX5ly
Slides: buff.ly/3tOWCMQ

#embedded #hardware #faultinjection #starlink #hacking #infosec

Angelin Booz さんがリポスト

Today we remember our friend the late Jerry Lawson, one of the most influential names of the early video game industry. Jerry created game cartridges as we know them, changing the way games were created and sold, and helped to grow our industry immeasurably. Thank you, Jerry.

nvmusa's tweet image. Today we remember our friend the late Jerry Lawson, one of the most influential names of the early video game industry.

Jerry created game cartridges as we know them, changing the way games were created and sold, and helped to grow our industry immeasurably. 

Thank you, Jerry.

Angelin Booz さんがリポスト

Frida 16.0.7 is out! 🎉 frida.re/news/2022/12/0…

fridadotre's tweet image. Frida 16.0.7 is out! 🎉
frida.re/news/2022/12/0…

Angelin Booz さんがリポスト

Here are some slides and hands-on about Linux x86-64 reverse engineering: github.com/romainthomas/r…

rh0main's tweet image. Here are some slides and hands-on about Linux x86-64 reverse engineering:

github.com/romainthomas/r…

Angelin Booz さんがリポスト

We now support executing GPU code compiled with nvc++ - godbolt.org/z/36rEac6zY - we're not yet quite sure why it's so very slow but it's a start! -mg


Angelin Booz さんがリポスト

For whom I've ever wondered how Rosetta 2 can be so efficient! Very interesting insights in this blog post! I naïvely thought it was decompiling code to a higher level IR (LLVM or something else) and then opt+retargetting. How wrong I was.

New blog post: "Why is Rosetta 2 fast?" dougallj.wordpress.com/2022/11/09/why…

dougallj's tweet image. New blog post: "Why is Rosetta 2 fast?"

dougallj.wordpress.com/2022/11/09/why…


Angelin Booz さんがリポスト

Reverse engineering via GDB.


Loading...

Something went wrong.


Something went wrong.