Slándáil Research:
Feeds
Feeds
Search
Search Engine
Feed: Project Zero
Link
The Windows Registry Adventure #1: Introduction and research results
The Windows Registry Adventure #2: A brief history of the feature
First handset with MTE on the market
An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploit
Analyzing a Modern In-the-wild Android Exploit
MTE As Implemented, Part 3: The Kernel
MTE As Implemented, Part 2: Mitigation Case Studies
MTE As Implemented, Part 1: Implementation Testing
Summary: MTE As Implemented
Release of a Technical Report into Intel Trust Domain Extensions
Multiple Internet to Baseband Remote Code Execution Vulnerabilities in Exynos Modems
Exploiting null-dereferences in the Linux kernel
DER Entitlements: The (Brief) Return of the Psychic Paper
Exploiting CVE-2022-42703 - Bringing back the stack attack
Mind the Gap
A Very Powerful Clipboard: Analysis of a Samsung in-the-wild exploit chain
Gregor Samsa: Exploiting Java's XML Signature Verification
RC4 Is Still Considered Harmful
The quantum state of Linux kernel garbage collection CVE-2021-0920 (Part I)
2022 0-day In-the-Wild Exploitation…so far
The curious tale of a fake Carrier.app
An Autopsy on a Zombie In-the-Wild 0-day
Release of Technical Report into the AMD Security Processor
The More You Know, The More You Know You Don’t Know
CVE-2021-1782, an iOS in-the-wild vulnerability in vouchers
CVE-2021-30737, @xerub's 2021 iOS ASN.1 Vulnerability
FORCEDENTRY: Sandbox Escape
Racing against the clock -- hitting a tiny kernel race window
A walk through Project Zero metrics
Zooming in on Zero-click Exploits
A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution
This shouldn't have happened: A vulnerability postmortem
Windows Exploitation Tricks: Relaying DCOM Authentication
Using Kerberos for Authentication Relay Attacks
How a simple Linux kernel memory corruption bug can lead to complete system compromise
Fuzzing Closed-Source JavaScript Engines with Coverage Feedback
Understanding Network Access in Windows AppContainers
An EPYC escape: Case-study of a KVM breakout
Fuzzing iOS code on macOS at native speed
Designing sockfuzzer, a network syscall fuzzer for XNU
Policy and Disclosure: 2021 Edition
Who Contains the Containers?
In-the-Wild Series: October 2020 0-day discovery
An iOS hacker tries Android
Introducing the In-the-Wild Series
In-the-Wild Series: Chrome Infinity Bug
In-the-Wild Series: Chrome Exploits
In-the-Wild Series: Android Post-Exploitation
In-the-Wild Series: Windows Exploits
In-the-Wild Series: Android Exploits
Hunting for Bugs in Windows Mini-Filter Drivers
The State of State Machines
A Look at iMessage in iOS 14
Windows Exploitation Tricks: Trapping Virtual Memory Access
Déjà vu-lnerability
An iOS zero-click radio proximity exploit odyssey
Oops, I missed it again!
Enter the Vault: Authentication Issues in HashiCorp Vault
Announcing the Fuzzilli Research Grant Program
Attacking the Qualcomm Adreno GPU
JITSploitation I: A JIT Bug
JITSploitation II: Getting Read/Write