Discussion about the research and development of software and hardware rootkits.
Topics
- Kernel post-exploitation and persistence
- Function hooking and diverting execution
- Subverting / infecting firmware and hardware
- Modifying / manipulating embedded systems
- Platform firmware exploitation
Posting guidelines
- Link to the original source
- Tag PDF submissions with [PDF]
- Whitepapers are preferred over slides
- Self-posts are allowed only for on-topic technical questions
Related resources
Community