IoTSec Pulse
Home
Resources
Submit
Sign In
Home
Resources
Book
From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research
View on Amazon
Explore Awesome IoT Security Insights
One-stop hub for IoT security insights, analyses, tools and more.
Search Help
Query Filter Values
Built with
Dirstarter
© 2025 IoTSec Pulse. All rights reserved.
Privacy Policy
Terms of Service
Sitemap
2025-04-04
CVE-2024-38077
slides
One Bug to Rule Them All: Stably Exploiting a Preauth RCE Vulnerability on Windows Server 2025
Microsoft
Operating System
2025-04-04
2025-03-15
reverse engineering
Full-stack Reverse Engineering of the Original Microsoft Xbox
Microsoft
Game Console
2025-03-15
2025-03-03
poc
Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit
Microsoft
Game Console
2025-03-03
2025-02-24
Xbox360BadUpdate: Software only hypervisor exploit for Xbox 360
Microsoft
Game Console
2025-02-24
Hacking the Xbox 360 Hypervisor Part 1: System Overview
Microsoft
Game Console
2025-02-24
2025-01-23
hardware
reverse engineering
Xbox 360 security in details: the long way to RGH3
Microsoft
Game Console
2025-01-23
2024-10-05
CVE-2024-30090
Pwn2Own
Kernel
Streaming vulnerabilities from Windows Kernel - Proxying to Kernel - Part II
Microsoft
Operating System
2024-10-05
2024-10-04
CVE-2024-30052
Exploiting Visual Studio via dump files - CVE-2024-30052
Microsoft
IDE
2024-10-04
2024-08-23
CVE-2024-30084
CVE-2024-35250
Pwn2Own
Kernel
Streaming vulnerabilities from Windows Kernel - Proxying to Kernel - Part I
Microsoft
Operating System
2024-08-23
2024-01-09
protocol
Diving into Windows Remote Access Service for Pre-Auth Bugs
Microsoft
Operating System
2024-01-09
2023-08-10
slides
protocol
Diving into Windows Remote Access Service for Pre-Auth Bugs
Microsoft
Operating System
2023-08-10
2023-05-02
CVE-2023-28231
DHCPv6
protocol
CVE-2023-28231: RCE in the Microsoft Windows DHCPv6 Service
Microsoft
Operating System
2023-05-02
2022-08-18
CVE-2022-22944
CVE-2022-22682
CVE-2022-24838
CVE-2022-31014
whitepaper
You Have One New Appwntment: Exploiting iCalendar Properties in Enterprise Applications
Synology
VMware
Apple
Microsoft
Google
Application
2022-08-18
CVE-2022-22944
CVE-2022-22682
CVE-2022-24838
CVE-2022-31014
slides
You Have One New Appwntment - Hacking Proprietary iCalendar Properties
Synology
VMware
Apple
Microsoft
Google
Application
2022-08-18
CVE-2022-22944
CVE-2022-22682
CVE-2022-24838
CVE-2022-31014
You Have One New Appwntment: Exploiting iCalendar Properties in Enterprise Applications
VMware
Synology
Apple
Microsoft
Google
Application
2022-08-18
2022-04-13
fuzzing
Inside the Black Box | How We Fuzzed Microsoft Defender for IoT and Found Multiple Vulnerabilities
Microsoft
Application
2022-04-13
2022-03-28
CVE-2021-42310
CVE-2021-42312
CVE-2021-37222
CVE-2021-42313
CVE-2021-42311
Pwning Microsoft Azure Defender for IoT | Multiple Flaws Allow Remote Code Execution for All
Microsoft
Application
2022-03-28
2021-06-01
slides
fuzzing
How I Found 16 Microsoft Office Excel Vulnerabilities in 6 Months
Microsoft
Office Software
2021-06-01
2018-12-29
From Zero to Zero Day
Microsoft
Browser
2018-12-29
You've reached the end