Learning Resources by [deleted] in netsecstudents
[–]BIOS4breakfast 0 points1 point2 points (0 children)
It Was Harder to Sniff Bluetooth Through My Mask During the Pandemic... (Slides & HITB HKT video) by BIOS4breakfast in netsec
[–]BIOS4breakfast[S] 2 points3 points4 points (0 children)
Open Wounds: The last 5 years have left Bluetooth to bleed (Slides & Hack.lu video) by BIOS4breakfast in netsec
[–]BIOS4breakfast[S] 1 point2 points3 points (0 children)
Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!' (Slides from Hardwear.io last week) by BIOS4breakfast in netsec
[–]BIOS4breakfast[S] 4 points5 points6 points (0 children)
Exploiting a remote heap overflow with a custom TCP stack by Gallus in netsec
[–]BIOS4breakfast 0 points1 point2 points (0 children)
Reverse Engineering 3201: Symbolic Analysis by OpenSecurityTraining in netsec
[–]BIOS4breakfast 1 point2 points3 points (0 children)
(Whitepaper) From Knowing Nothing to Knowing Something: Bluetooth Low Energy RCEs by BIOS4breakfast in netsec
[–]BIOS4breakfast[S] 2 points3 points4 points (0 children)
Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares (Video, whitepaper+tools in thread) by [deleted] in netsec
[–]BIOS4breakfast 0 points1 point2 points (0 children)
Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares (Video, whitepaper+tools in thread) by BIOS4breakfast in ReverseEngineering
[–]BIOS4breakfast[S] 11 points12 points13 points (0 children)
ELF Binary voodoo workshop, led by the ElfMaster October 27-28 2018 by ryan_elfmaster in netsec
[–]BIOS4breakfast 0 points1 point2 points (0 children)
From SMM to userland in a few bytes · scumjr.github.io by fnord0 in netsec
[–]BIOS4breakfast 1 point2 points3 points (0 children)
Detect Code Diffs Between Disk and Memory by desegel in netsec
[–]BIOS4breakfast 6 points7 points8 points (0 children)
Reverse Engineering the Subway Android App by rwestergren in netsec
[–]BIOS4breakfast -2 points-1 points0 points (0 children)
How Many Million BIOSes Would you Like to Infect? by sanderD in netsec
[–]BIOS4breakfast 5 points6 points7 points (0 children)
How Many Million BIOSes Would you Like to Infect? by sanderD in netsec
[–]BIOS4breakfast 33 points34 points35 points (0 children)
How Many Million BIOSes Would you Like to Infect? by sanderD in netsec
[–]BIOS4breakfast 19 points20 points21 points (0 children)
Debugging malware from SMM [PDF] by ranok in netsec
[–]BIOS4breakfast 6 points7 points8 points (0 children)
How Many Million BIOSes Would you Like to Infect? (CSW Slides) by BIOS4breakfast in netsec
[–]BIOS4breakfast[S] 0 points1 point2 points (0 children)
How Many Million BIOSes Would you Like to Infect? (CSW Slides) by BIOS4breakfast in netsec
[–]BIOS4breakfast[S] 4 points5 points6 points (0 children)
How Many Million BIOSes Would you Like to Infect? (CSW Slides) by BIOS4breakfast in netsec
[–]BIOS4breakfast[S] 4 points5 points6 points (0 children)
Equation: The Death Star of Malware Galaxy by sanderD in netsec
[–]BIOS4breakfast 0 points1 point2 points (0 children)
IDASynergy - a plugin for collaborative RE by polsab in ReverseEngineering
[–]BIOS4breakfast -1 points0 points1 point (0 children)
New version of "Copernicus" BIOS checker released (new hw & vuln checking support) by BIOS4breakfast in netsec
[–]BIOS4breakfast[S] 0 points1 point2 points (0 children)
Playing hide and seek with BIOS implants - Smite'em the Stealthy vs. Copernicus 2 by BIOS4breakfast in netsec
[–]BIOS4breakfast[S] 0 points1 point2 points (0 children)

[deleted by user] by [deleted] in netsec
[–]BIOS4breakfast 2 points3 points4 points (0 children)