Skip to main content

Recent

Adding Symbols to a Stripped Kernel for Debugging and Exploitation
·5 mins
Research Kernel Qemu
Setting up a better kernel exploit development environment.
Jellyfin User Mapping on Proxmox
·3 mins
Research Proxmox
Managing user mappings for Proxmox containers.
Creating udev Rules for the Bus Pirate 5
·2 mins
Research Bus Pirate IoT
Mounting your Bus Pirate 5 to /dev/buspirate and /dev/piratebin.
Ghidra Python3 Scripting Cheatsheet
·2 mins
Research Reverse-Engineering Ghidra
Notes on writing python3 scripts for Ghidra.
Security assessment of a commercial router using physical access: a case study
·1 min
IoT Internet of Things Router Security Trusted Computing
Physical access to a device can greatly help in vulnerability research as it opens up new vectors for exploitation.