Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Extracting Embedded MultiMediaCard (eMMC) contents in-system
June 20, 2025 | Dmitry Janushkevich
CONTINUE READING
SUBSCRIBE
Blog post
MindShaRE: Dealing with encrypted router firmware
February 06, 2020
MindshaRE
,
Router
,
Reverse Engineering
Blog post
Looking Back at the Zero Day Initiative in 2019
January 30, 2020
Retrospective
,
Stats
Blog post
Pwn2Own Miami 2020 - Schedule and Live Results
January 21, 2020
Pwn2Own
,
SCADA
,
ICS
,
Results
Blog post
Reliably Finding and Exploiting ICS/SCADA Bugs
January 16, 2020
SCADA
,
Advantech
,
Research
Blog post
The January 2020 Security Update Review
January 14, 2020
Security Patch
,
Microsoft
,
Adobe
,
Citrix
Blog post
Pwn2Own Returns to Vancouver for 2020
January 09, 2020
Pwn2Own
,
Tesla
,
Microsoft
,
Google
,
Apple
,
VMware
Blog post
Privilege Escalation Via the Core Shell COM Registrar Object
December 20, 2019
Top 5
,
Windows
,
Research
Blog post
Regular Exploitation of a Tesla Model 3 through Chromium RegExp
December 19, 2019
Top 5
,
Tesla
,
Pwn2Own
Blog post
Looking Back at the Impact of CVE-2019-0604: A SharePoint RCE
December 18, 2019
Top 5
,
SharePoint
,
Research
Blog post
Local Privilege Escalation in Win32k.sys Through Indexed Color Palettes
December 17, 2019
Top 5
,
Windows
,
Research
keyboard_arrow_left
keyboard_arrow_right