Aggregator
VENOM漏洞分析与利用
Slave Malware Analysis: Evolving From IBAN Swaps to Persistent Webinjects
Slave Malware Analysis: Evolving From IBAN Swaps to Persistent Webinjects
Slave Malware Analysis: Evolving From IBAN Swaps to Persistent Webinjects
Links
These are some of my friends’ blogs. The order is random, and inactive links are removed from time to time.
约伊兹的萌狼乡手札 - The salty yet adorable “Moe Wolf.”
FiveYellowMice’s Blog - FiveYellowMice Dalao.
Ekkkkkkko - Egg Uncle, model enthusiast,mobile hacker.
Debugwar - Author of QDoctor, kernel expert, and full-stack hacker.
ADDX - +x, automotive hacker, a Honkai: Star Rail luck god — same as me.
Stone - Stone, drummer, anime fan, and hacker with the looks of a Japanese pop idol.
About me
INTJ & Chaotic Neutral
All our lives, we are pursued by the ghosts of what we could not have in our youth.
- Skill: Automotive, Penetration, Hardware, Reverse Engineering
- E-Mail: i#gorgias.me [GPG]
GPG Fingerprint
DFD7DE476562A6D0DCB40C016F9433372927B146一次校园Android平台应用的逆向分析
iOS 内核堆利用技术点之 mach_msg ool
An Overview of Exploit Packs (Update 25) May 2015
TICSA turns one
11 May 2015 marks one year since the network security provisions of the Telecommunications (Interception Capability and Security) Act 2013 came into effect.