![]() I tricked m3., the Twitter analysis website, with adversarial inputs I spent a week to find out why.ĭisable Same Origin Policy in iOS WKWebView with private APIĮxamining CVE-2020-27932 on macOS 10.15.7īooting a macOS Apple Silicon kernel in QEMUīuild macOS ARM apps in Xcode without a real macOS ARM SDK Learning VoWifi, VoLTE, and IMS: because I'm too Millennial to make a phone call VoLTE/VoWiFi research with $0 of equipment: set up a phone network over Wi-Fi calling Hardware-accelerated virtual machines on jailbroken iPhone 12 / iOS 14.1 Get root on macOS 12.3.1: proof-of-concepts for Linus Henze's CoreTrust and DriverKit bugs (CVE-2022-26766, CVE-2022-26763)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |