
Eugene Rodionov
@vxradius
Followers
5K
Following
1K
Media
5
Statuses
1K
A big honor to coauthor with @abc_sup and Gulshan the very first blog from Android Red Team on analysis and exploitation of CVE-2023-20938 in Android Binder driver at š„ .The slide-deck presented at @offensive_con is available at
2
36
86
RT @a13xp0p0v: Slides for my talk at @h2hconference 2024:. Diving into Linux kernel security š¤æ. I described how to learn this complex areaā¦.
0
80
0
RT @gr4yf0x: Custom Linux kernel fuzzing with libFuzzer by @R00tkitSMM
r00tkitsmm.github.io
Hi everyone! Iām really happy to tell you about my experimenting adventure today. I decided to experiment with KCOV and see how I can hook it into libfuzzer and boot the kernel without spending too...
0
22
0
RT @ayper: Excited to share our latest post on memory safety! We're tackling spatial safety in our massive C++ codebase by hardening libc+ā¦.
security.googleblog.com
Posted by Alex Rebert and Max Shavrick, Security Foundations, and Kinuko Yasuda, Core Developer Attackers regularly exploit spatial mem...
0
51
0
RT @spaceraccoonsec: āBreak into the world of vulnerability research. and become a zero-day hunter.ā I have a new book with @nostarch!. Bā¦.
nostarch.com
Find vulnerabilities before anyone else does.
0
141
0
RT @R00tkitSMM: TL;DR I Implemented a super reliable macOS kernel binary rewriting to instrument any KEXT or XNU atā¦.
r00tkitsmm.github.io
This blog post is the result of some weekend research, where I delved into Pishi, a static macOS kernel binary rewriting tool, which I presented at POC2024. During the weekdays, I focus on Linux...
0
194
0
RT @andreyknvl: Getting made fun of because you cover laptop webcam with a sticker? š. Here are materials from my talk about controlling Thā¦.
0
143
0
RT @bsdaemon: A while ago I've given a talk on how to build exceptional security research teams: - I continue conviā¦.
github.com
Presentations in different conferences. Contribute to rrbranco/Presentations development by creating an account on GitHub.
0
30
0
RT @domenuk: Project Zero blog:.LLMs find 0days now! š. And: our fuzzer setup did *not* reproduce it! https://t.cā¦.
0
150
0
RT @Flipacholas: As promised, here is a new article: PlayStation Vita (Part 1). Enjoy!.
copetti.org
An in-depth analysis that explains how this console works internally
0
81
0
RT @klecko0: I've written a post on SELinux and some public bypasses for Android kernel exploitation. It's especially relevant for Samsungā¦.
klecko.github.io
This post aims at giving an overview of what SELinux is, how it is implemented, and how to bypass it, from the point of view of Android kernel exploitation.
0
131
0
RT @matrosov: IDAlib is the first idiomatic Rust bindings library for @HexRaysSA IDA SDK, helping go beyond C/C++ or Python in RE automatioā¦.
0
26
0
RT @matrosov: š„PoC is now public! . target = " https://{ip_address}/cgi/login.cgi".command = "touch /tmp/BRLY". libc = 0x76283000 # we trā¦.
github.com
BINARLY Research Tools and PoCs. Contribute to binarly-io/ToolsAndPoCs development by creating an account on GitHub.
0
93
0
RT @jeffvanderstoep: Iām super excited about this blogpost. The approach is so counterintuitive, and yet the results are so much better thaā¦.
security.googleblog.com
Posted by Jeff Vander Stoep - Android team, and Alex Rebert - Security Foundations Memory safety vulnerabilities remain a pervasive threa...
0
76
0
Continuing the series on exploiting AndroidĀ Binder with Binder internals blogĀ Deep dive into Binder driver byĀ @abc_sup and Gulshan. We also releaseĀ -- tiny lib featuring how to do IPC via Binder driver. Happy Binder hacking!.
github.com
Contribute to androidoffsec/libdevbinder development by creating an account on GitHub.
0
18
68