Forwarded from theooo's stash.
Open Sourcing our Firmware
https://frame.work/blog/open-sourcing-our-firmware
https://frame.work/blog/open-sourcing-our-firmware
Framework
Open Sourcing our Firmware
We want to empower you to participate directly in the creation of Framework product ecosystems. We have a couple of updates to share around expanding community access.
I am deleting my mobile telegram client.
First step to delete telegram.
Available only on matrix.
void00r:matrix.org
First step to delete telegram.
Available only on matrix.
void00r:matrix.org
Forwarded from Easy Physics
This media is not supported in your browser
VIEW IN TELEGRAM
A fascinating hobby is the American engineer Russell Buck, who finds "Easter eggs" with pop culture characters inside chips and microchips.
EP
EP
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.
The included LiveCD provides a complete Linux programming and debugging environmentβall without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:
β’ Program computers using C, assembly language, and shell scripts
β’ Corrupt system memory to run arbitrary code using buffer overflows and format strings
β’ Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
β’ Outsmart common security measures like nonexecutable stacks and intrusion detection systems
β’ Gain access to a remote ser
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.
The included LiveCD provides a complete Linux programming and debugging environmentβall without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:
β’ Program computers using C, assembly language, and shell scripts
β’ Corrupt system memory to run arbitrary code using buffer overflows and format strings
β’ Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
β’ Outsmart common security measures like nonexecutable stacks and intrusion detection systems
β’ Gain access to a remote ser
marwanhawari/stew
π₯ An independent package manager for compiled binaries.
https://github.com/marwanhawari/stew
π₯ An independent package manager for compiled binaries.
https://github.com/marwanhawari/stew
GitHub
GitHub - marwanhawari/stew: π₯ An independent package manager for compiled binaries.
π₯ An independent package manager for compiled binaries. - marwanhawari/stew
schollz/croc
Easily and securely send things from one computer to another π π¦
https://github.com/schollz/croc
Easily and securely send things from one computer to another π π¦
https://github.com/schollz/croc
GitHub
GitHub - schollz/croc: Easily and securely send things from one computer to another :package:
Easily and securely send things from one computer to another :crocodile: :package: - GitHub - schollz/croc: Easily and securely send things from one computer to another :package:
#books
The Art of Unix Programming
by Eric S. Raymond
http://www.catb.org/~esr/writings/taoup/html/index.html
The Art of Unix Programming
by Eric S. Raymond
http://www.catb.org/~esr/writings/taoup/html/index.html
Proof of concept for abusing Telegram's "People Near Me" feature and tracking people's location
https://github.com/jkctech/Telegram-Trilateration
https://redd.it/svdqkn
@PrivacyGuides
https://github.com/jkctech/Telegram-Trilateration
https://redd.it/svdqkn
@PrivacyGuides
GitHub
GitHub - jkctech/Telegram-Trilateration: Proof of concept for abusing Telegram's "People Near Me" feature and tracking people'sβ¦
Proof of concept for abusing Telegram's "People Near Me" feature and tracking people's location - jkctech/Telegram-Trilateration