ShofEL2, a Tegra X1 and Nintendo Switch exploit Reverse Engineering |
- ShofEL2, a Tegra X1 and Nintendo Switch exploit
- Reverse Engineering Facebook API: Private Video Downloader
- Deobfuscation of Virtualization-obfuscated Code through Symbolic Execution and Compilation Optimization [PDF]
- A bunch of Red Pills: VMware Escapes
- Reversing Ethereum Smart Contracts: Payable, Selfdestruct, and Optimizing
- Running system commands through Nvidia signed binaries
- Using a Custom Windows Kernel Driver to Load and Execute Windows Kernel Shellcode
ShofEL2, a Tegra X1 and Nintendo Switch exploit Posted: 24 Apr 2018 07:35 AM PDT |
Reverse Engineering Facebook API: Private Video Downloader Posted: 24 Apr 2018 09:39 AM PDT |
Posted: 24 Apr 2018 11:52 AM PDT |
A bunch of Red Pills: VMware Escapes Posted: 23 Apr 2018 02:04 PM PDT |
Reversing Ethereum Smart Contracts: Payable, Selfdestruct, and Optimizing Posted: 23 Apr 2018 03:04 PM PDT |
Running system commands through Nvidia signed binaries Posted: 23 Apr 2018 02:05 PM PDT |
Using a Custom Windows Kernel Driver to Load and Execute Windows Kernel Shellcode Posted: 23 Apr 2018 10:31 AM PDT |
You are subscribed to email updates from Reverse Engineering. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment