Co-Pain

Co-Pain

244 bookmarks
Custom sorting
Page Blanche
Page Blanche
·forum.routeconverter.com·
Page Blanche
diotro/maestro
diotro/maestro
Contribute to diotro/maestro development by creating an account on GitHub.
·github.com·
diotro/maestro
googleprojectzero/iOS-messaging-tools
googleprojectzero/iOS-messaging-tools
Contribute to googleprojectzero/iOS-messaging-tools development by creating an account on GitHub.
·github.com·
googleprojectzero/iOS-messaging-tools
gravitational/gravity
gravitational/gravity
Kubernetes application deployments for restricted, regulated or remote environments. - gravitational/gravity
·github.com·
gravitational/gravity
LinusHenze/WebKit-RegEx-Exploit
LinusHenze/WebKit-RegEx-Exploit
Contribute to LinusHenze/WebKit-RegEx-Exploit development by creating an account on GitHub.
·github.com·
LinusHenze/WebKit-RegEx-Exploit
Did the “Man With No Name” Feel Insecure?
Did the “Man With No Name” Feel Insecure?
Posted by James Forshaw, Taker of Names Sometimes when I'm doing security research I'll come across a bug which surprises me. I discove...
·googleprojectzero.blogspot.com·
Did the “Man With No Name” Feel Insecure?
More Mac OS X and iPhone sandbox escapes and kernel bugs
More Mac OS X and iPhone sandbox escapes and kernel bugs
Posted by Ian Beer A couple of weeks ago Apple released OS X 10.9.5 and iOS 8 which fixed a number of sandbox escapes and privilege es...
·googleprojectzero.blogspot.com·
More Mac OS X and iPhone sandbox escapes and kernel bugs
pwn4fun Spring 2014 - Safari - Part II
pwn4fun Spring 2014 - Safari - Part II
Posted by Ian Beer TL;DR An OS X GPU driver trusted a user-supplied kernel C++ object pointer and called a virtual function. The I...
·googleprojectzero.blogspot.com·
pwn4fun Spring 2014 - Safari - Part II
Finding and exploiting ntpd vulnerabilities
Finding and exploiting ntpd vulnerabilities
Posted by Stephen Röttger, Time Lord [Foreword by Chris Evans: this post by Stephen represents the first Project Zero guest blog post. ...
·googleprojectzero.blogspot.com·
Finding and exploiting ntpd vulnerabilities
A Token’s Tale
A Token’s Tale
Posted by James Forshaw currently impersonating NT AUTHORITY\SYSTEM. Much as I enjoy the process of vulnerability research sometimes th...
·googleprojectzero.blogspot.com·
A Token’s Tale
Exploiting the DRAM rowhammer bug to gain kernel privileges
Exploiting the DRAM rowhammer bug to gain kernel privileges
Rowhammer blog post (draft) Posted by Mark Seaborn, sandbox builder and breaker, with contributions by Thomas Dullien, reverse en...
·googleprojectzero.blogspot.com·
Exploiting the DRAM rowhammer bug to gain kernel privileges
A Tale of Two Exploits
A Tale of Two Exploits
Posted by Natalie Silvanovich, Collision Investigator and (Object) Field Examiner CVE-2015-0336 is a type confusion vulnerability in the AS...
·googleprojectzero.blogspot.com·
A Tale of Two Exploits
In-Console-Able
In-Console-Able
Posted by James Forshaw, giving the security community a shoulder to cry on. TL;DR; this blog post describes an unfixed bug in Windows...
·googleprojectzero.blogspot.com·
In-Console-Able
Dude, where’s my heap?
Dude, where’s my heap?
Guest posted by Ivan Fratric, spraying 1TB of memory The ability to place controlled content to a predictable location in memory can be ...
·googleprojectzero.blogspot.com·
Dude, where’s my heap?
Hack The Galaxy: Hunting Bugs in the Samsung Galaxy S6 Edge
Hack The Galaxy: Hunting Bugs in the Samsung Galaxy S6 Edge
Posted by Natalie Silvanovich, Planner of Bug Bashes Recently, Project Zero researched a popular Android phone, the Samsung Galaxy S6 E...
·googleprojectzero.blogspot.com·
Hack The Galaxy: Hunting Bugs in the Samsung Galaxy S6 Edge
Down the Rabbit-Hole...
Down the Rabbit-Hole...
Posted by Tavis Ormandy, Security Research Over-Engineer. “Sometimes, hacking is just someone spending more time on something than anyo...
·googleprojectzero.blogspot.com·
Down the Rabbit-Hole...
Implant Teardown
Implant Teardown
Posted by Ian Beer, Project Zero In the earlier posts we examined how the attackers gained unsandboxed code execution as root on iPhone...
·googleprojectzero.blogspot.com·
Implant Teardown
SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4
SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4
Posted by Ned Williamson, 20% on Project Zero Introduction I have a somewhat unique opportunity in this writeup to highlight my experie...
·googleprojectzero.blogspot.com·
SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4
Fuzzing ImageIO
Fuzzing ImageIO
Posted by Samuel Groß, Project Zero This blog post discusses an old type of issue, vulnerabilities in image format parsers, in a new(er)...
·googleprojectzero.blogspot.com·
Fuzzing ImageIO
Task Models and Diagrams for Users Interface Design | SpringerLink
Task Models and Diagrams for Users Interface Design | SpringerLink
We are proud to present the TAMODIA 2006 proceedings. In 2006, the TA- MODIA workshop celebrated its ?fth anniversary. TAMODIA is an obscure acronym that stands for TAsk MOdels and DIAgrams for user i
·link.springer.com·
Task Models and Diagrams for Users Interface Design | SpringerLink
SIMATIC S7-1200 -Take control of communication
SIMATIC S7-1200 -Take control of communication
SIMATIC S7-1200 controllers are the intelligent choice for compact automation solutions with extended communication options and integrated technology functions. They are available in standard and failsafe versions.
·new.siemens.com·
SIMATIC S7-1200 -Take control of communication
Change log
Change log
·opensource.apple.com·
Change log
List
List
·skylightcyber.com·
List
j00ru//vx on Twitter
j00ru//vx on Twitter
Today I'm happy to release new research I've been working on for a while: 0-click RCE via MMS in all modern Samsung phones (released 2015+), due to numerous bugs in a little-known custom "Qmage" image codec supported by Skia on Samsung devices. Demo: https://t.co/8KRIhy4Fpk— j00ru//vx (@j00ru) May 6, 2020
·twitter.com·
j00ru//vx on Twitter