Bandar Alharbi (@0xb4x) 's Twitter Profile
Bandar Alharbi

@0xb4x

(•)E Focusing mode

ID: 2895615482

linkhttps://www.0x01team.com/ calendar_today10-11-2014 12:46:11

5 Tweet

51 Followers

122 Following

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Escape PS2 emulator to hack PS4/PS5. Great post by CTurt cturt.github.io/mast1c0re.html #playstation #hacking #infosec #cybersecurity #exploit #reversengineering

Escape PS2 emulator to hack PS4/PS5.
Great post by <a href="/CTurtE/">CTurt</a>
 
cturt.github.io/mast1c0re.html 

#playstation #hacking #infosec #cybersecurity #exploit #reversengineering
Waleed (@waleedalzamil) 's Twitter Profile Photo

Happy to share (me, Bandar Alharbi & Meshari) our new findings on Microchip Atmel SAM E70/S70/V70/V71 family Writeup - CVE-2024-4760: 0x01team.com/hw_security/by… Were we are able to bypass the security mechanism by voltage fault injection⚡️!

Happy to share (me, <a href="/0xB4x/">Bandar Alharbi</a> &amp; Meshari) our new findings on Microchip Atmel SAM E70/S70/V70/V71 family 

Writeup - CVE-2024-4760: 0x01team.com/hw_security/by…

Were we are able to bypass the security mechanism by voltage fault injection⚡️!
Bandar Alharbi (@0xb4x) 's Twitter Profile Photo

We were able to fully emulate a Cortex-M7 MCU ROM code after dumping it… we used Qiling Framework to do it. It’s interesting when you have almost full control without any hardware, allowing you to reverse and fuzz the binary! 0x01team.com/sw_security/sa…

We were able to fully emulate a Cortex-M7 MCU ROM code after dumping it… we used <a href="/qiling_io/">Qiling Framework</a> to do it.

It’s interesting when you have almost full control without any hardware, allowing you to reverse and fuzz the binary!

0x01team.com/sw_security/sa…