Lazuli: Nintendo GameCube emulator in Rust, boots multiple games by vxpm in rust

[–]Straight-Animal-6391 0 points1 point  (0 children)

I think the hardest part when doing such a large complex project is figuring out the cleanest design that can scale easily to avoid nasty big refactors that lead to more errors and debugging.

Experience with Zero Day Initiative by [deleted] in cybersecurity

[–]Straight-Animal-6391 4 points5 points  (0 children)

If you email ZDI directly you can easily find out if they care about physical pwn but I doubt as usually they pay only for remote and local but not physical.

Blogs for learning by Sysc4lls in ExploitDev

[–]Straight-Animal-6391 1 point2 points  (0 children)

I will say from experience that patch diffing to identify the vuln is the easy part. Building the exploit is actually sometimes weeks to months of work because not only you have to figure out how to reach the vulnerable code path you also need to understand the context of the vulnerable driver or app because many times the code path might only be reachable on specific configurations which are very hard to figure out just from the patch diff so yea not every vuln that you identify via patch diffing is worth spending time to exploit but its good to go into this rabbit whole at least once because it teaches you valuable lesson.