Hacker News
Linking pages
- Reverse engineering my router's firmware with binwalk - sergioprado.blog https://embeddedbits.org/reverse-engineering-router-firmware-with-binwalk/ 134 comments
- GitHub - l4rz/reverse-engineering-dell-idrac-to-get-rid-of-gpu-throttling: Unsupported GPUs in Dell C4130 get throttled, here's how to prevent this from happening. https://github.com/l4rz/reverse-engineering-dell-idrac-to-get-rid-of-gpu-throttling 90 comments
- medfusion-4000-research/README.md at master · sgayou/medfusion-4000-research · GitHub https://github.com/sgayou/medfusion-4000-research/blob/master/doc/README.md 78 comments
- GitHub - gcarmix/HexWalk: Hex Viewer/Editor/Analyzer compatible with Linux/Windows/MacOS https://github.com/gcarmix/HexWalk 70 comments
- Looking inside the box - Anvil Secure https://anvilventures.com/blog/looking-inside-the-box.html 69 comments
- How I “found” the database of the Donald Daters App | by Elliot Alderson | Medium https://medium.com/@fs0c131y/how-i-found-the-database-of-the-donald-daters-app-af88b06e39ad 61 comments
- How I Couldn’t Stop Poking at Mysterious CompuServe Server Hard Disk Images | by Christian Mund | Medium https://medium.com/@mpnet/trying-to-make-sense-of-compuserve-server-hard-disk-images-posted-on-archive-org-b1c62ce6012b 59 comments
- Microsoft finds new NETGEAR firmware vulnerabilities that could lead to identity theft and full system compromise - Microsoft Security Blog https://www.microsoft.com/security/blog/2021/06/30/microsoft-finds-new-netgear-firmware-vulnerabilities-that-could-lead-to-identity-theft-and-full-system-compromise/ 54 comments
- G-3PO: A Protocol Droid for Ghidra | by Olivia Lucca Fraser | Tenable TechBlog | Medium https://medium.com/tenable-techblog/g-3po-a-protocol-droid-for-ghidra-4b46fa72f1ff 52 comments
- 16 Offensive Security Tools for SysAdmins | HackerTarget.com http://hackertarget.com/11-offensive-security-tools/ 37 comments
- Unpacking ASIC firmware: AntMiner Exploited - SerHack https://serhack.me/articles/unpacking-asic-firmware-antminer-exploited/ 14 comments
- A Red Team Guide for a Hardware Penetration Test: Part 1 | by Adam Toscher | Medium https://adam-toscher.medium.com/a-red-team-guide-for-a-hardware-penetration-test-part-1-2d14692da9a1 12 comments
- Steganography - A list of useful tools and resources - 0xRick’s Blog https://0xrick.github.io/lists/stego/ 11 comments
- Reverse Engineering Supermicro IPMI – peterkleissner.com https://peterkleissner.com/2018/05/27/reverse-engineering-supermicro-ipmi/ 10 comments
- How To Update U-Boot For PostmarketOS On The Pine Phone https://bloggerbust.ca/post/how-to-update-uboot-for-postmarketos-on-the-pinephone/ 8 comments
- A tale of private key reuse. In 2017, while attempting to get some… | by Koen Rouwhorst | Medium https://koen.io/2019/01/17/a-tale-of-private-key-reuse/ 6 comments
- A Beginner’s guide into Router Hacking and Firmware Emulation – SecNigma https://secnigma.wordpress.com/a-beginners-guide-into-router-hacking-and-firmware-emulation/ 6 comments
- Finding bugs to trigger Unauthenticated Command Injection in a NETGEAR router (PSV-2022–0044) | by Flatt Security Inc. | Medium https://flattsecurity.medium.com/finding-bugs-to-trigger-unauthenticated-command-injection-in-a-netgear-router-psv-2022-0044-2b394fb9edc 4 comments
- CVE-2021-32030: ASUS GT-AC2900 Authentication Bypass — Atredis Partners https://www.atredis.com/blog/2021/4/30/asus-authentication-bypass 3 comments
- Make It Rain with MikroTik. Not a Coinhive Writeup | by Jacob Baines | Tenable TechBlog | Medium https://medium.com/tenable-techblog/make-it-rain-with-mikrotik-c90705459bc6 3 comments
Related searches:
Search whole site: site:github.com
Search title: GitHub - ReFirmLabs/binwalk: Firmware Analysis Tool
See how to search.