Jl_N_
@jl_n_
Forgeur de bulletins, artiste et orfèvre
ID: 1270024122
15-03-2013 15:51:18
120 Tweet
78 Followers
198 Following
Here are the slides for my talk last week Insomni'hack "Building a Flexible Hypervisor-Level Debugger" drive.google.com/open?id=1ZMUsz…
Exploiting Dirty Pipe on Android Two publications, both use similar techniques without additional vulnerabilities. 1. Notes and an exploit by polygraphene: github.com/polygraphene/D… 2. Slides by Giovanni Rocca Giovanni Rocca: docs.google.com/presentation/d…
La Gendarmerie nationale démantèle une organisation criminelle internationale facilitant le vol de véhicules par piratage - interpellation coordonnée de 31 individus - enquête menée par #ComCyberGend sous l'autorité du parquet cyber de la JUNALCO 1/2👇 bfmtv.com/police-justice…
0-Day Insights - Deep Dive: Qualcomm MSM Linux Kernel & ARM Mali GPU 0-day Exploit Attacks of October 2023 zerodayengineering.com/insights/qualc… (by Alisa Esage Шевченко)
Full Chain Baseband Exploits. Details of the baseband and baseband-to-AP pivot vulnerabilities, exploitable for RCE, chained together at the same time ▶️Part 1: labs.taszk.io/articles/post/… ▶️Part 2:labs.taszk.io/articles/post/… ▶️Part 3: labs.taszk.io/articles/post/… Taszk Security Labs Daniel Komaromy
🎥 TF1 est revenu sur le rôle clé des experts du Forces cyber du ministère de l'Intérieur lors d'une opération judiciaire internationale visant les utilisateurs de la messagerie chiffrée "Ghost". Une expertise qui a permis d'infiltrer des📱pourtant réputés impossibles à pirater... 💪 tf1.fr/tf1/jt-20h/vid…
Gal Beniamini And wrote a script to decrypt all keystore keys. This can also be used to bruteforce the FDE passphrase off the device! (2/2)
Project Zero blog: "Over The Air - Vol. 2, Pt. 3: Exploiting The Wi-Fi Stack on Apple Devices" by Gal Beniamini - googleprojectzero.blogspot.com/2017/10/over-a…