Recent
Adding Symbols to a Stripped Kernel for Debugging and Exploitation
·5 mins
Research
Kernel
Qemu
Setting up a better kernel exploit development environment.
Jellyfin User Mapping on Proxmox
·3 mins
Research
Proxmox
Managing user mappings for Proxmox containers.
Creating udev Rules for the Bus Pirate 5
·2 mins
Research
Bus Pirate
IoT
Mounting your Bus Pirate 5 to /dev/buspirate and /dev/piratebin.
Ghidra Python3 Scripting Cheatsheet
·2 mins
Research
Reverse-Engineering
Ghidra
Notes on writing python3 scripts for Ghidra.
Security assessment of a commercial router using physical access: a case study
·1 min
IoT
Internet of Things
Router Security
Trusted Computing
Physical access to a device can greatly help in vulnerability research as it opens up new vectors for exploitation.