Rowhammer Attacks on DDR5 with Self-Correcting Synchronization
https://comsec-files.ethz.ch/papers/phoenix_sp26.pdf
https://comsec-files.ethz.ch/papers/phoenix_sp26.pdf
👍1
Critical Android 0-Click Vulnerability in System Component Allows RCE Attacks https://cybersecuritynews.com/android-0-click-rce-vulnerability/
Cyber Security News
Critical Android 0-Click Vulnerability in System Component Allows Remote Code Execution Attacks
Google has issued a critical security alert for Android devices, highlighting a severe zero-click vulnerability in the system's core components that could allow attackers to execute malicious code remotely without any user interaction.
👍3
ARM64 Reversing and Exploitation Part 2 – Use After Free | 8kSec Blogs
https://8ksec.io/arm64-reversing-and-exploitation-part-2-use-after-free/
https://8ksec.io/arm64-reversing-and-exploitation-part-2-use-after-free/
👍4
RCE via type confusion vulnerability on Lasso SAML Library
https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2193
https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2193
👍2
Windows Heap Exploitation - From Heap Overflow to Arbitrary R/W
https://mrt4ntr4.github.io/Windows-Heap-Exploitation-dadadb/
https://mrt4ntr4.github.io/Windows-Heap-Exploitation-dadadb/
mrT4ntr4's Blog
Windows Heap Exploitation - From Heap Overflow to Arbitrary R/W
TLDR I was unable to find some good writeups/blogposts on Windows user mode heap exploitation which inspired me to write an introductory but practical post on Windows heap internals and exploitati
👍1
HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface https://share.google/ot3QjPEaGXlIeTcyY
Cyber Security News
HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface
The HydraPWK project's latest Apes-T1 snapshot refines its penetration-testing Linux distribution by replacing Elasticsearch with the open-source OpenSearch, resolving licensing issues and enhancing tools for industrial security assessments.