Our Blog

Our news

All you need to know

Chaining multiple techniques and tools for domain takeover using RBCD

Reading time: ~26 min
Intro In this blog post I want to show a simulation of a real-world Resource Based Constrained Delegation attack scenario...

Intro to Chrome’s V8 from an exploit development angle

Reading time: ~14 min
Intro Last Christmas I was doing quite a bit of research around an exploit for Chrome’s JavaScript engine, V8. While...

[Dual-Pod-Shock] Emotional abuse of a DualShock

Reading time: ~35 min
Hacking PlayStation DualShock controllers to stream audio to their internal speakers. Ciao a tutti. Introduction I didn’t really know what...