evilsocket

  • ~/
  • rss

    2015

  • 2015-05-04
    Android Native API Hooking With Library Injection and ELF Introspection.
  • 2015-05-02
    Using ARM Inline Assembly and Naked Functions to Fool Disassemblers
  • 2015-05-01
    Dynamically Inject a Shared Library Into a Running Process on Android/ARM
  • 2015-04-30
    Fuzzing With AFL-Fuzz, a Practical Example ( AFL vs Binutils )
  • 2015-02-20
    SuperFish AdWare Found Inside X-Notifier Browser Extension Code.
  • 2015-02-12
    RuberTooth - a Complete Ruby Porting of the Ubertooth Libraries and Utilities.
  • 2015-02-11
    Hackers Phishing Leakers: A New BitCoin Phishing Social Technique.
  • 2015-02-01
    Huawei Modems Authentication Bypass
  • 2015-01-29
    Nike+ FuelBand SE BLE Protocol Reversed
  • 2015-01-16
    How to Install Metasploit on OS X Mavericks and Yosemite, an Updated Guide
  • 2014

  • 2014-11-03
    dSploit Merges With ZImperium zANTI2
  • 2014-09-22
    Back From the Grave: VMWare Host Clipboard Grabber
  • 2014-07-17
    Back From the Grave: ELF32 Universal Command Injector
  • 2014-07-15
    How TELCOs Are Bullying Researchers, an Italian Story.
  • 2014-04-21
    Why Reinventing the Wheel Isn't Always Wrong
Page 4 of 5
Copyright © 2025 Simone Margaritelli
  • ~/
  • rss