mirror of
https://github.com/0xor0ne/awesome-list.git
synced 2026-04-28 14:07:50 -05:00
Update 20240425 - cybersecurity
This commit is contained in:
@@ -34,8 +34,10 @@
|
||||
* ["Hunting for Unauthenticated n-days in Asus Routers"][662]
|
||||
* ["LeftoverLocals: Listening to LLM responses through leaked GPU local memory"][687]
|
||||
* ["Leveraging Binary Ninja il to Reverse a Custom ISA: Cracking the “pot of gold” 37C3"][612]
|
||||
* ["Modern implant design: position independent malware development"][690]
|
||||
* ["My new superpower"][688]
|
||||
* ["Playing with libmalloc in 2024"][610]
|
||||
* ["Shell We Assemble?"][689]
|
||||
* ["Strengthening the Shield: MTE in Heap Allocators"][596]
|
||||
* "Writing a Debugger From Scratch"
|
||||
* ["Attaching to a Process"][449]
|
||||
@@ -1500,3 +1502,5 @@ https://flattsecurity.medium.com/cve-2021-20226-a-reference-counting-bug-which-l
|
||||
[686]: https://github.com/joaoviictorti/RustRedOps
|
||||
[687]: https://blog.trailofbits.com/2024/01/16/leftoverlocals-listening-to-llm-responses-through-leaked-gpu-local-memory/
|
||||
[688]: https://zeromips.org/posts/2024-01-08-superpower/
|
||||
[689]: https://redops.at/en/blog/shell-we-assemble-unleashing-x86-inline-assembly-for-shellcode-execution
|
||||
[690]: https://5pider.net/blog/2024/01/27/modern-shellcode-implant-design/
|
||||
|
||||
Reference in New Issue
Block a user