Update 20240425 - cybersecurity

This commit is contained in:
0xor0ne
2024-04-25 09:13:32 +02:00
parent 4f2c32b813
commit 8b7b6bea9e

View File

@@ -34,8 +34,10 @@
* ["Hunting for Unauthenticated n-days in Asus Routers"][662]
* ["LeftoverLocals: Listening to LLM responses through leaked GPU local memory"][687]
* ["Leveraging Binary Ninja il to Reverse a Custom ISA: Cracking the “pot of gold” 37C3"][612]
* ["Modern implant design: position independent malware development"][690]
* ["My new superpower"][688]
* ["Playing with libmalloc in 2024"][610]
* ["Shell We Assemble?"][689]
* ["Strengthening the Shield: MTE in Heap Allocators"][596]
* "Writing a Debugger From Scratch"
* ["Attaching to a Process"][449]
@@ -1500,3 +1502,5 @@ https://flattsecurity.medium.com/cve-2021-20226-a-reference-counting-bug-which-l
[686]: https://github.com/joaoviictorti/RustRedOps
[687]: https://blog.trailofbits.com/2024/01/16/leftoverlocals-listening-to-llm-responses-through-leaked-gpu-local-memory/
[688]: https://zeromips.org/posts/2024-01-08-superpower/
[689]: https://redops.at/en/blog/shell-we-assemble-unleashing-x86-inline-assembly-for-shellcode-execution
[690]: https://5pider.net/blog/2024/01/27/modern-shellcode-implant-design/