An Introduction To Offensive Security
Jacob Krasnov | Anthony Rose This blog is going to be the first entry in a series that goes over...
Jacob Krasnov | Anthony Rose This blog is going to be the first entry in a series that goes over...
Introduction Reverse engineering of Android applications is usually considered as somewhat effortless because of the possibility of retrieving the Java...
Part 1: Detailed overview of Samsung's TrustZone components Part 2: Tools development for reverse-engineering and vulnerability research Part 3: Vulnerability...
As you may have read in our previous blog post, the release of Triton v0.8 came with a lot of...
Introduction Fuchsia is a new operating system developed by Google, targeting the AArch64 and x86_64 architectures. While little is known...
Introduction Ansible is an open-source software that automates configuration management and software deployment. If you're not familiar with Ansible, we...
Context Quarkslab is one of the 10 ITSEF (Information Technology Security Evaluation Facility, CESTI in French) licensed by the ANSSI's...
Introduction Embedded devices are a huge and wide world of options for CPU architectures, operating systems and file systems. You...
We are pleased to announce that we released Triton v0.8 under the terms of the Apache License 2.0 (same license...
How many times have you needed to use John The Ripper to do some password cracking but just not had...
Introduction In March 2020, Google patched a critical vulnerability affecting many MediaTek based devices . This vulnerability had been known...
Introduction Welcome to the final chapter of the Trimedia series. In the first part of the series, I introduced this...
Introduction After detailing Samsung's TrustZone implementation in the first part of this series, this blog post introduces the tools that...
Motivations After a general introduction on the ARM TrustZone and a focus on Qualcomm's implementation, this new series of articles...
Introduction This blog post deals with the Legu packer, an Android protector developed by Tencent that is currently one of...
Introduction Irma is our file security analysis software, originally developed as an open source project with the sponsorship of 5...
Cobalt Strike is software for Adversary Simulations and Red Team Operations. What this means is, if you wanted to test your...
TLDR: Canary tokens are not new but can help give you some Intel into your attackers, be it insider or...
Increasing the TXpower above what is allowed in your country can be illegal. If you decide to make these changes...
I have a number of Kodi Media Centre running in different rooms around the house. Some are hooked up to...
So the OSCP journey is hard work, needs commitment, understanding from your wife and a try harder attitude (you will...
Ok, so you have upgraded your Wi-Fi to a new shiney circular Ubiquiti device....and you are using PfSense too? Welcome...
See attached PDF, i will migrate to a proper post when i can find time..... Stapler VM - Summary
If like me you want to customise your Squid Proxy error page then , you have come to the correct...