1Mongoose: Preauth RCE and MTLS Bypass on Devices (opens in new tab)(evilsocket.net)2evilsocket1mo ago1
2Open sourcing Nerve, a tool to instrument LLMs to perform tasks, without code (opens in new tab)(github.com)4evilsocket1y ago1
3Cryptographic failures in RF encryption allow stealing robotic devices (opens in new tab)(cossacklabs.com)63evilsocket3y ago17
4Weaponizing and Gamifying AI for WiFi Hacking: Presenting Pwnagotchi 1.0.0 (opens in new tab)(evilsocket.net)3evilsocket6y ago0
5How to Create a Malware Detection System with Machine Learning (opens in new tab)(evilsocket.net)2evilsocket6y ago0
7Analysis of multiple vulnerabilities in AirDroid (~50M Android users vulnerable) (opens in new tab)(blog.zimperium.com)3evilsocket9y ago1
8Reversing the Smarter Coffee Machine Protocol to Make Coffee Using the Terminal (opens in new tab)(evilsocket.net)5evilsocket9y ago4
9WiFi Pentesting with a Pineapple NANO, OS X and BetterCap (opens in new tab)(evilsocket.net)3evilsocket9y ago0
10Analysis of multiple vulnerabilities in different open source BTS products (opens in new tab)(blog.zimperium.com)3evilsocket9y ago0