Email address | private |
---|---|
First Active | 2011-09-28 |
Last Active | 2013-02-13 |
This document is a short guide on ARM exploitation and architecture.
eb11c5954a8a1ffe7fe345267174615ea26305cce19dcecad07807f79430e55d
This whitepaper discusses NFC, or Near Field Communication, and explains the related security implications.
78900f87153de6166ba2ee5624d5c39dd5850681f6372282ca3274f7bda7d808
Microsoft MSDN suffers from a flash related cross site scripting vulnerability.
5287400f5abcf76de960b559d2b8eb0cc9b3ae6309b9b6c881caa40374889cfa
Microsoft Bing's Flash editor suffers from an input validation vulnerability that can lead to cross site scripting attacks.
7db7ba6f70e95039239d765d4aeb5b8090c822c565c7ff69ae6a471fe19d3fcc
The Skype vendor website suffers from a cross site scripting vulnerability.
22dbe42f1a221b90095564d5f9448154d5c7174012997d50ff15350beae0f877
This is a set of slides from the talk Hacking Your Droid - Android Malwares.
a1e9bedd0c65db1d85eddf796d21f8f2cbf3fe3d92ed9fcded237afd35dfe3df
A whitepaper on the basics of Android and reverse engineering of Android applications.
3a7c611870da5531d81c577fdf35fe9dc0af53466f037facf67b7aa647b36b60