Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Pwn2Own Returns to Ireland with a One Million Dollar WhatsApp Target
July 31, 2025 | Dustin Childs
CONTINUE READING
SUBSCRIBE
Blog post
MindShaRE: Hardware Reversing with the TP-Link TL-WR841N Router
September 03, 2019
MindshaRE
,
Belkin
,
Research
,
Reverse Engineering
Blog post
MindShaRE: Automated Bug Hunting by Modeling Vulnerable Code
July 16, 2019
MindshaRE
,
Research
,
Reverse Engineering
Blog post
MindShaRE: Hardware Reversing with the Belkin Surf N300 Router
June 06, 2019
MindshaRE
,
Hardware
,
Belkin
Blog post
Floating-Poison Math in Chakra
August 22, 2018
Chakra
,
JavaScript
,
Research
Blog post
MindshaRE: An Introduction to PyKD
July 19, 2018
MindshaRE
,
PyKD
,
Python
Blog post
MindshaRE: Variant Hunting with IDA Python
June 27, 2018
IDA
,
Python
,
MindshaRE
Blog post
MindshaRE: Walking the Windows Kernel with IDA Python
May 22, 2018
MindshaRE
,
IDA
,
Python
Blog post
A Matching Pair of Use-After-Free Bugs in Chakra asm.js
December 22, 2017
JavaScript
,
Chakra
,
Research
,
Top 5
Blog post
Check it Out: Enforcement of Bounds Checks in Native JIT Code
October 05, 2017
Research
,
JavaScript
,
Chakra
keyboard_arrow_left
keyboard_arrow_right