Breaking Down Barriers: Exploiting Pre-Auth SQL Injection In WhatsUp Gold - CVE-2024-6670 |
|
|
|
Firmware Security: Alcatel-Lucent ALE-DeskPhone |
|
|
|
CVE-2024-27822: macOS PackageKit Privilege Escalation |
|
|
|
Exploiting American Conquest |
|
|
|
CVE-2024-1212: Unauthenticated Command Injection In Progress Kemp LoadMaster |
|
|
|
TP-Link TDDP Buffer Overflow Vulnerability |
|
|
|
Exploiting embedded mitel phones for unauthenticated remote code execution |
|
|
|
Hacking a Smart Home Device |
|
|
|
Hunting for Unauthenticated n-days in Asus Routers |
|
|
|
Exploring Counter-strike: Global Offensive Attack Surface |
|
|
|
Analyzing the SonicWall Custom Grub LUKS Encryption Modifications |
|
|
|
Achieving Remote Code Execution in Steam: a journey into the Remote Play protocol |
|
|
|
The Nightmare of Apple's OTA Update: Bypassing the Signature Verification and Pwning the Kernel |
|
|
|
Hacking a Tapo TC60 Camera |
|
|
|
Shambles: The Next-Generation IoT Reverse Engineering Tool to Discover 0-Day Vulnerabilities |
|
|
|
CVE-2023-33298 - Perimeter81 Local Privilege Escalation |
|
|
|
Reversing Citrix Gateway for XSS |
|
|
|
Reverse Engineering Coin Hunt World’s Binary Protocol |
|
|
|
Hacking my “smart” toothbrush |
|
|
|
‘FriendlyName’ Buffer Overflow Vulnerability in Wemo Smart Plug V2 |
|
|
|
Compromising Garmin’s Sport Watches: A Deep Dive into GarminOS and its MonkeyC Virtual Machine |
|
|
|
Impersonating Other Players with UDP Spoofing in Mirror |
|
|
|
Reversing UK mobile rail tickets |
|
|
|
Reverse Engineering the Apple Multipeer Connectivity Framework |
|
|
|
Pentest-Story: Empirum password decryption |
|
|
|