Skip content

1 10 193 results

Filter by

  • Remote Code Execution in Broadcom Altiris IRM

    A critical unauthenticated remote code execution (RCE) vulnerability was discovered in the Broadcom Symantec Altiris Inventory Rule Management...

    Read more
    LRQA Cyber Labs
  • Exploring the Shadow Labyrinth

    How LRQA cracked the Shadow Labyrinth in Hack The Box’s 2025 CTF, using reverse engineering, decryption and custom...

    Read more
    LRQA Cyber Labs
  • Next Level Smuggling with WebAssembly

    Using WebAssembly to deliver malicious payloads through HTML smuggling.

    Read more
    LRQA Cyber Labs
  • The $1.5bn Bybit theft – what happened?

    An analysis of one of the most significant breaches in crypto history - the theft of $1.5 billion...

    Read more
    LRQA Cyber Labs
  • Introducing Raccoon

    Introducing Raccoon - a C# tool for extending the screenshot functionality of Command and Control (C2) frameworks, even...

    Read more
    LRQA Cyber Labs
  • Time Travel Debugging Shellcode with Binary Ninja

    Learn how to debug shellcode using Time Travel Debugging (TTD) in Binary Ninja. This guide walks you through...

    Read more
  • Binary Ninja Plugin

    Recently, in response to a customer incident we needed to reverse engineer a malware sample of WhiteRabbit ransomware...

    Read more
  • This Badge is My Badge

    When it comes to covert entry assessments, successfully capturing RFID badge values can mean the difference between failure...

    Read more
  • Version Tracking in Ghidra

    When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s...

    Read more
  • Vulnerabilities in AI Agents

    LLMs are becoming increasingly accessible to everyone. It is very easy to create your own LLM system, however...

    Read more

Error

Error

No results found

No results found that match your query

Loading results