Follow

youtube.com/watch?v=fA6W9_zLCe

A great explaination of how an IOS exploit is built and that demo is great.

The specific exploit is old, but the process in general reminds me of the reversing work that I've done on other platforms (especially in terms of defeating ASLR).

Sign in to participate in the conversation
Rights.Ninja Social

Social.Rights.Ninja is a small Mastodon instance for those looking for a quiet home-base from which to explore the fediverse.
Sign-ups require approval, please contact us on [Matrix] at #public:social.rights.ninja if you would like to be approved for access.