Hacker News new | past | comments | ask | show | jobs | submit | from login
Exploiting Qualcomm EDL Programmer Tools (1): Gaining Access and PBL Internals (alephsecurity.com)
2 points by pabs3 9 months ago | past
SuDump: Exploiting suid binaries through the kernel (alephsecurity.com)
62 points by todsacerdoti on Oct 20, 2021 | past | 1 comment
Exploiting crash handlers: LPE on Ubuntu (alephsecurity.com)
1 point by nieve on Feb 18, 2021 | past
Exploiting crash handlers: LPE on Ubuntu (alephsecurity.com)
3 points by g0xA52A2A on Feb 17, 2021 | past
Accelerating iOS on QEMU with hardware virtualization (KVM) (alephsecurity.com)
22 points by mdelias on July 19, 2020 | past | 5 comments
Running iOS in QEMU to an interactive bash shell (alephsecurity.com)
11 points by ingve on Dec 5, 2019 | past
Overcoming (some) Spectre browser mitigations (alephsecurity.com)
1 point by he0001 on July 2, 2018 | past
Overcoming (some) Spectre browser mitigations (alephsecurity.com)
2 points by gok on June 28, 2018 | past
Overcoming (some) Spectre browser mitigations (alephsecurity.com)
5 points by alephsecurity on June 27, 2018 | past
Exploiting Qualcomm EDL Programmers, Part 1 (alephsecurity.com)
1 point by 68c12c16 on Jan 23, 2018 | past
Exploiting Qualcomm EDL Programmers (alephsecurity.com)
2 points by glax on Jan 22, 2018 | past
Untethered initroot CVE-2016-10277 (alephsecurity.com)
3 points by DiabloD3 on Aug 31, 2017 | past
Bypassing Nexus 6 Secure Boot Through Kernel Command-Line Injection (alephsecurity.com)
2 points by sr2 on May 23, 2017 | past
All OnePlus Devices Are Vulnerable to Downgrade Attacks (alephsecurity.com)
2 points by curiousgal on May 12, 2017 | past
Attacking Nexus 9 with Malicious Headphones (alephsecurity.com)
3 points by robin_reala on May 12, 2017 | past
Attacking Nexus 9 with Malicious Headphones (alephsecurity.com)
5 points by Jerry2 on March 18, 2017 | past
Attacking Nexus 9 with Malicious Headphones (alephsecurity.com)
1 point by TheGuyWhoCodes on March 9, 2017 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: