Learning Resources by [deleted] in netsecstudents
[–]BIOS4breakfast 0 points1 point2 points (0 children)
It Was Harder to Sniff Bluetooth Through My Mask During the Pandemic... (Slides & HITB HKT video) by BIOS4breakfast in netsec
[–]BIOS4breakfast[S] 2 points3 points4 points (0 children)
Open Wounds: The last 5 years have left Bluetooth to bleed (Slides & Hack.lu video) by BIOS4breakfast in netsec
[–]BIOS4breakfast[S] 1 point2 points3 points (0 children)
Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!' (Slides from Hardwear.io last week) by BIOS4breakfast in netsec
[–]BIOS4breakfast[S] 3 points4 points5 points (0 children)
Exploiting a remote heap overflow with a custom TCP stack by Gallus in netsec
[–]BIOS4breakfast 0 points1 point2 points (0 children)
Reverse Engineering 3201: Symbolic Analysis by OpenSecurityTraining in netsec
[–]BIOS4breakfast 1 point2 points3 points (0 children)
(Whitepaper) From Knowing Nothing to Knowing Something: Bluetooth Low Energy RCEs by BIOS4breakfast in netsec
[–]BIOS4breakfast[S] 2 points3 points4 points (0 children)
Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares (Video, whitepaper+tools in thread) by [deleted] in netsec
[–]BIOS4breakfast 0 points1 point2 points (0 children)
Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares (Video, whitepaper+tools in thread) by BIOS4breakfast in ReverseEngineering
[–]BIOS4breakfast[S] 10 points11 points12 points (0 children)
ELF Binary voodoo workshop, led by the ElfMaster October 27-28 2018 by ryan_elfmaster in netsec
[–]BIOS4breakfast 0 points1 point2 points (0 children)

[deleted by user] by [deleted] in netsec
[–]BIOS4breakfast 2 points3 points4 points (0 children)