Forwarded from Freestanding
How to Install Gentoo and Turn Your PS4 into a Emulation Station
https://ps4gentoo.github.io/about/
#gentoo
Forwarded from Freestanding
package-managers-ccs2008.pdf
155.5 KB
Forwarded from Freestanding
kumdelicia.rar
24.1 MB
backup of "kumdelicia" about hacking threads
> https://anonfiles.com/Z0C0weqeu5/kumdelicia_rar
edit: update
#hacking
> https://anonfiles.com/Z0C0weqeu5/kumdelicia_rar
edit: update
#hacking
Topics: Power Analysis Attack. #hardware #hacking
Simple explanation about Power Analysis Attacks.
https://www.youtube.com/watch?v=2iDLfuEBcs8&ab_channel=ColinO%27Flynn
Simple explanation about Power Analysis Attacks.
https://www.youtube.com/watch?v=2iDLfuEBcs8&ab_channel=ColinO%27Flynn
YouTube
ECED4406 - 0x501 Power Analysis Attacks
Reversing_Microsoft_Visual_C++_Part_II_Classes_Methods_and_RTTI.pdf
230.1 KB
Topics: MSVC C++ Reverse Engineering. #reversing
Reversing Microsoft Visual C++ Part II: Classes, Methods and RTTI.
Source: https://www.openrce.org/articles/full_view/23
Reversing Microsoft Visual C++ Part II: Classes, Methods and RTTI.
Source: https://www.openrce.org/articles/full_view/23
Topics: C main(). #c #programming #reversing
This post explains how main() is called in Linux through debugging.
https://dbp-consulting.com/tutorials/debugging/linuxProgramStartup.html
This post explains how main() is called in Linux through debugging.
https://dbp-consulting.com/tutorials/debugging/linuxProgramStartup.html
swimming-in-the-kernel-pool-part-2.pdf
20.7 MB
Topics: Windows Kernel Exploitation. #exploit #reversing
Exploit Development: Swimming In The (Kernel) Pool - Leveraging Pool Vulnerabilities From Low-Integrity Exploits
Source: https://connormcgarr.github.io/swimming-in-the-kernel-pool-part-1/
https://connormcgarr.github.io/swimming-in-the-kernel-pool-part-2/
Exploit Development: Swimming In The (Kernel) Pool - Leveraging Pool Vulnerabilities From Low-Integrity Exploits
Source: https://connormcgarr.github.io/swimming-in-the-kernel-pool-part-1/
https://connormcgarr.github.io/swimming-in-the-kernel-pool-part-2/
Topics: DMA #hardware #hacking
PCILeech uses PCIe hardware devices to read and write target system memory. This is achieved by using DMA over PCIe. No drivers are needed on the target system.
PCILeech is capable of inserting a wide range of kernel implants into the targeted kernels - allowing for easy access to live ram and the file system via a "mounted drive". It is also possible to remove the logon password requirement, loading unsigned drivers, executing code and spawn system shells. PCIleech runs on Windows and Linux. Supported target systems are currently the x64 versions of: UEFI, Linux, FreeBSD and Windows.
https://github.com/ufrisk/pcileech
PCILeech uses PCIe hardware devices to read and write target system memory. This is achieved by using DMA over PCIe. No drivers are needed on the target system.
PCILeech is capable of inserting a wide range of kernel implants into the targeted kernels - allowing for easy access to live ram and the file system via a "mounted drive". It is also possible to remove the logon password requirement, loading unsigned drivers, executing code and spawn system shells. PCIleech runs on Windows and Linux. Supported target systems are currently the x64 versions of: UEFI, Linux, FreeBSD and Windows.
https://github.com/ufrisk/pcileech
GitHub
GitHub - ufrisk/pcileech: Direct Memory Access (DMA) Attack Software
Direct Memory Access (DMA) Attack Software. Contribute to ufrisk/pcileech development by creating an account on GitHub.
p.file
Topics: DMA #hardware #hacking PCILeech uses PCIe hardware devices to read and write target system memory. This is achieved by using DMA over PCIe. No drivers are needed on the target system. PCILeech is capable of inserting a wide range of kernel implants…
blog-frizk-net-2021-10-acorn-html.pdf
1.3 MB
Modifying the Acorn CLE-215+ FPGA into a PCILeech DMA attack device
source: https://blog.frizk.net/2021/10/acorn.html
source: https://blog.frizk.net/2021/10/acorn.html
Topics: Roadmap, Course syllabus. #learning #roadmap #misc
Really useful resources (lectures/book recommendations).
From these, i personally recommend Cambridge, MIT and Zurich (Oxford has some good reading lists too).
- NIST | Syllabus
- UTAH | Math | ECE (find syllabus for each course using Google dorks)
- MIT | Math Roadmap | Math | Courses | CSE Course
- CAMBRIDGE | Part IA | Part IB | Part II | Part III | Math
- Oxford
- Zurich
https://enr-apps.as.cmu.edu/open/SOC/SOCServlet/search
https://omscscourseplanner.com/
https://engg.hku.hk/Portals/0/UG/syllabuses/Syllabus-EEE-21-22-4Y.pdf
Really useful resources (lectures/book recommendations).
From these, i personally recommend Cambridge, MIT and Zurich (Oxford has some good reading lists too).
- NIST | Syllabus
- UTAH | Math | ECE (find syllabus for each course using Google dorks)
- MIT | Math Roadmap | Math | Courses | CSE Course
- CAMBRIDGE | Part IA | Part IB | Part II | Part III | Math
- Oxford
- Zurich
https://enr-apps.as.cmu.edu/open/SOC/SOCServlet/search
https://omscscourseplanner.com/
https://engg.hku.hk/Portals/0/UG/syllabuses/Syllabus-EEE-21-22-4Y.pdf
👍1