First analysis of Apple's USB Restricted Mode bypass (CVE-2025-24200)

Being Overlord on the Steam Deck with 1 Byte

Attacking the Samsung Galaxy A* Boot Chain

Hydradancer: Faster USB Emulation for Facedancer

DJI – The ART of obfuscation

PixieFail: Nine Vulnerabilities UEFI Implementations

Android data encryption in depth

Unaligned accesses in C/C++: what, why and solutions to do it properly

QBinDiff: A Modular Diffing Toolkit

Let’s Go into the rabbit hole (part 1) — the challenges of dynamically hooking Golang programs

Starlink's User Terminal Firmware

Vulnerabilities in the TPM 2.0 reference implementation code

Defeating eBPF Uprobe Monitoring

Attacking Titan M with Only One Byte

Secure Messaging Apps and Group Protocols, Part 2

Commit Level Vulnerability Dataset for Android (AOSP)

Heap Overflow in OpenBSD's Slaacd via Router Advertisement

Digging into Linux namespaces – part 1

A look at the new Fuchsia Operating System and some bugs

Reverse-engineering Broadcom wireless chipsets

Playing with the Windows Notification Facility (WNF)

Overview of Intel SGX – Part 1, SGX Internals

Xen exploitation part 3: XSA-182, Qubes escape

Xen exploitation part 2: XSA-148, from guest to host

Xen exploitation part 1: XSA-105, from nobody to root

Kernel Vulnerabilities in the Samsung S4

Turning Regular Code into Atrocities with LLVM

Deobfuscation: recovering an OLLVM-protected program