diff options
| author | Andrey Konovalov | 2020-02-11 20:44:25 +0100 |
|---|---|---|
| committer | GitHub | 2020-02-11 20:44:25 +0100 |
| commit | 850e47ff6208c367cdebbece9d79f095604e7d06 (patch) | |
| tree | fc7627dd68906fc9e780f016fde541347d2ccbea /README.md | |
| parent | 4be09eeb8865088aa194613110d68400d35195be (diff) | |
Update README.md
Diffstat (limited to 'README.md')
| -rw-r--r-- | README.md | 4 |
1 files changed, 2 insertions, 2 deletions
| @@ -359,7 +359,7 @@ Pull requests are welcome. | |||
| 359 | 359 | ||
| 360 | ### Other | 360 | ### Other |
| 361 | 361 | ||
| 362 | [2019: "https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html" by Hugues Anguelkov](https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html) [article, CVE-2019-9503, CVE-2019-9500] | 362 | [2019: "Reverse-engineering Broadcom wireless chipsets" by Hugues Anguelkov](https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html) [article, CVE-2019-9503, CVE-2019-9500] |
| 363 | 363 | ||
| 364 | [2019: "CVE-2019-2000 - Android kernel binder vulnerability analysis"](https://xz.aliyun.com/t/4494) [article, CVE-2019-2000] | 364 | [2019: "CVE-2019-2000 - Android kernel binder vulnerability analysis"](https://xz.aliyun.com/t/4494) [article, CVE-2019-2000] |
| 365 | 365 | ||
| @@ -761,7 +761,7 @@ HITCON CTF Quals 2019 (PoE): [source and exploit](https://github.com/david942j/c | |||
| 761 | r2con CTF 2019: [source, exploit and writeup](https://github.com/esanfelix/r2con2019-ctf-kernel) | 761 | r2con CTF 2019: [source, exploit and writeup](https://github.com/esanfelix/r2con2019-ctf-kernel) |
| 762 | 762 | ||
| 763 | 763 | ||
| 764 | ### Misc | 764 | ## Misc |
| 765 | 765 | ||
| 766 | https://github.com/Fuzion24/AndroidKernelExploitationPlayground | 766 | https://github.com/Fuzion24/AndroidKernelExploitationPlayground |
| 767 | 767 | ||
