Lessons From Red Teaming 100 Generative AI Products: https://arxiv.org/abs/2501.07238
=> More informations about this toot | View the thread
[#]Embedded #firmware #fuzzing with multi-stream inputs: https://www.youtube.com/watch?v=lqZ945w6OH8
Learn fuzzing with Tobias Scharnowski with Marius Muench in Austin, TX, this March: https://www.youtube.com/watch?v=lqZ945w6OH8
=> More informations about this toot | View the thread
How to Create Vulnerable-Looking Endpoints to Detect and Mislead Attackers: https://utkusen.substack.com/p/how-to-create-vulnerable-looking
=> More informations about this toot | View the thread
Come speak at #BOOTSTRAP25 this March in Austin, TX. Join our world-class trainers and speakers for an event filled with great fun, great food, and great learning. Up to $1000 travel reimbursement for all accepted workshop speakers: https://cfp.ringzer0.training/ringzer0-bootstrap25-austin/cfp
=> More informations about this toot | View the thread
Reverse-engineering a carry-lookahead adder in the Pentium: http://www.righto.com/2025/01/pentium-carry-lookahead-reverse-engineered.html
=> More informations about this toot | View the thread
Fuzzing GPRS layer-2 for fun and profit with Marius Muench: https://www.youtube.com/watch?v=Y_96A9UCRao
Learn fuzzing with Marius in Austin, TX this March: https://ringzer0.training/bootstrap25-fuzzing-and-attacking-custom-embedded-systems/
=> More informations about this toot | View the thread
How Hard Is It to Port Frida to an Unsupported Platform? (Let’s Find Out): https://zetier.com/porting-frida-software-on-openwrt/
=> More informations about this toot | View the thread
Make your fuzzing skills less fuzzy with Tobias Scharnowski and Marius Mench's 4-day in-person course on Fuzzing and Attacking Custom Embedded Systems. March 18-21, Austin TX, +1 day for our #BOOTSTRAP25 Event: https://ringzer0.training/bootstrap25-fuzzing-and-attacking-custom-embedded-systems/
=> More informations about this toot | View the thread
Calculator Forensics (2002): https://www.rskey.org/~mwsebastian/miscprj/forensics.htm
=> More informations about this toot | View the thread
Want to speak at our #BOOTSTRAP25 event in Austin, TX, this March? Submit your workshop to our Call For Workshops, and come hang out in Austin with our trainers, organizers and attendees! https://cfp.ringzer0.training/ringzer0-bootstrap25-austin/cfp
=> More informations about this toot | View the thread
Investigating an "evil" RJ45 dongle: https://lcamtuf.substack.com/p/investigating-an-evil-rj45-dongle
=> More informations about this toot | View the thread
Master The Art of Fault Injection with Niek Timmers in Austin, TX this March and receive complimentary access to our #BOOTSTRAP25 event: https://ringzer0.training/bootstrap25-the-art-of-fault-injection/
=> More informations about this toot | View the thread
From arbitrary pointer dereference to arbitrary read/write in latest Windows 11: https://security.humanativaspa.it/from-arbitrary-pointer-dereference-to-arbitrary-read-write-in-latest-windows-11/
=> More informations about this toot | View the thread
Automating & scaling firmware fuzzing video from Tobias Scharnowski: https://www.youtube.com/watch?v=yDRLW_xUP0w
Related Ringzer0 course: https://ringzer0.training/bootstrap25-fuzzing-and-attacking-custom-embedded-systems/
=> More informations about this toot | View the thread
The mysterious life of an exception: https://www.youtube.com/watch?v=hBFAdEqnv7w
Learn embedded firmware fuzzing with Tobias Scharnowski and Marius Muench in Austin, TX this March: https://ringzer0.training/bootstrap25-fuzzing-and-attacking-custom-embedded-systems/
=> More informations about this toot | View the thread
Ashfaq Ansari teaches everything you needed to know about Windows Kernel Exploitation but were afraid to ask, in his foundation and advanced virtual training course, #BOOTSTRAP25 March 9 - 15: https://ringzer0.training/bootstrap25-windows-kernel-exploitation/
=> More informations about this toot | View the thread
Our Call For Workshops is open. Submit your workshop ideas and speak at our #BOOTSTRAP25 event. Receive up to $1000 travel imbursement and hang out with our world class trainers and attendees! https://cfp.ringzer0.training/ringzer0-bootstrap25-austin/cfp
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
=> More informations about this toot | View the thread
Exploiting and Detecting Palo Alto Networks CVE-2024-0012: https://youtu.be/RgSGjn_Z1dg
=> More informations about this toot | View the thread
=> This profile with reblog | Go to ringzer0@infosec.exchange account This content has been proxied by September (ba2dc).Proxy Information
text/gemini