Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Extracting Embedded MultiMediaCard (eMMC) contents in-system
June 20, 2025 | Dmitry Janushkevich
CONTINUE READING
SUBSCRIBE
Blog post
CVE-2020-27897: Apple macOS Kernel OOB Write Privilege Escalation Vulnerability
December 10, 2020
Apple
,
Research
,
kext
Blog post
Detailing SaltStack Salt Command Injection Vulnerabilities
November 24, 2020
SaltStack
,
Salt
,
Research
Blog post
Pwn2Own Tokyo (Live from Toronto) – Day Three Results and Master of Pwn
November 08, 2020
Pwn2Own
,
Results
,
Western Digital
,
Synology
,
NETGEAR
,
TPLink
Blog post
Pwn2Own Tokyo (Live from Toronto) - Day Two Results
November 07, 2020
Pwn2Own
,
Results
,
Western Digital
,
Synology
,
TPLink
,
NETGEAR
Blog post
Pwn2Own Tokyo (Live from Toronto) - Day One Results
November 06, 2020
Pwn2Own
,
Results
,
Samsung
,
Western Digital
,
NETGEAR
,
TPLink
Blog post
Pwn2Own Tokyo (Live from Toronto) - Schedule and Live Results
November 05, 2020
Pwn2Own
,
Results
,
Samsung
,
Sony
,
NETGEAR
,
TPLink
Blog post
CVE-2020-16939: Windows Group Policy DACL Overwrite Privilege Escalation
October 27, 2020
Group Policy
,
Microsoft
,
Research
Blog post
Detailing Two VMware Workstation TOCTOU Vulnerabilities
October 22, 2020
VMware
,
Exploit
,
Research
Blog post
CVE-2019-0230: Apache Struts OGNL Remote Code Execution
October 07, 2020
Apache
,
Research
,
Struts
Blog post
The Anatomy of a Bug Door: Dissecting Two D-Link Router Authentication Bypasses
October 01, 2020
D-Link
,
Router
,
Research
keyboard_arrow_left
keyboard_arrow_right