delikely (@delikely) 's Twitter Profile
delikely

@delikely

ID: 1735224854

linkhttps://delikely.github.io calendar_today06-09-2013 14:02:42

50 Tweet

239 Followers

601 Following

Kevin2600 (@kevin2600) 's Twitter Profile Photo

Ladies and gentlemen, it is my honor to presenting you the Rolling-Pwn attack research on Honda Keyfob system. (rollingpwn.github.io/rolling-pwn/)

Ladies and gentlemen, it is my honor to presenting you the Rolling-Pwn attack research on Honda Keyfob system. (rollingpwn.github.io/rolling-pwn/)
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Great series on ELF format by Intezer Part 1: buff.ly/3FOaD4G Part 2: buff.ly/3UtoiC9 Part 3: buff.ly/3fIIP6V Part 4: buff.ly/3heJGNe #elf #Linux #unix #infotech #learning

Great series on ELF format by <a href="/IntezerLabs/">Intezer</a> 

Part 1: buff.ly/3FOaD4G 
Part 2:  buff.ly/3UtoiC9 
Part 3:  buff.ly/3fIIP6V 
Part 4:  buff.ly/3heJGNe 

#elf #Linux #unix #infotech #learning
Kevin2600 (@kevin2600) 's Twitter Profile Photo

Want to hack IVI of cars, but dont own one? Just try this interesting Damn Vulnerable Vehicle Application (Docker) made by delikely github.com/delikely/DVVA

Kevin2600 (@kevin2600) 's Twitter Profile Photo

I just wrote an article regarding to BLE relay attack on smart cars. Not much of new stuff, but tested on multiple cars, and it's amazing to see a 7 years old software still works as a charm. Thanks to Slawomir Jasek rollingpwn.github.io/BLE-Relay-Aatt…

I just wrote an article regarding to BLE relay attack on smart cars. Not much of new stuff, but tested on multiple cars, and it's amazing to see a 7 years old software still works as a charm.  Thanks to <a href="/slawekja/">Slawomir Jasek</a>  rollingpwn.github.io/BLE-Relay-Aatt…
Willem Melching (@pd0wm) 's Twitter Profile Photo

New blog post is out! Extracting the SecOC keys used for securing the CAN Bus on the 2021+ RAV4 Prime. icanhack.nl/blog/secoc-key… Research started all the way in 2022, but took many evenings of reverse engineering to get code execution. PoC: github.com/I-CAN-hack/sec…

New blog post is out! Extracting the SecOC keys used for securing the CAN Bus on the 2021+ RAV4 Prime. icanhack.nl/blog/secoc-key…

Research started all the way in 2022, but took many evenings of reverse engineering to get code execution. 

PoC: github.com/I-CAN-hack/sec…
quarkslab (@quarkslab) 's Twitter Profile Photo

Fast and Curious: Emulating Renesas RH850 System-on-Chip using Unicorn Engine Brought to you by Damien Cauquil (@[email protected]) and Phil BARRETT to make your automotive vulnerability research easier blog.quarkslab.com/emulating-rh85…

Fast and Curious: Emulating Renesas RH850 System-on-Chip using Unicorn Engine 
Brought to you by <a href="/virtualabs/">Damien Cauquil (@virtualabs@mamot.fr)</a>  and <a href="/Phil_BARR3TT/">Phil BARRETT</a> to make your automotive vulnerability research easier

blog.quarkslab.com/emulating-rh85…
Off-By-One Conference (@offbyoneconf) 's Twitter Profile Photo

Automotive security enthusiasts – don’t miss you chance to meet delikely, Security Researcher and Tech Lead at QAX STARV Lab at Off-By-One Conference He will be presenting his paper on "Unlocking Automotive Secrets - Strategies and Tool for accessing hidden services" #carhacking

Automotive security enthusiasts – don’t miss you chance to meet <a href="/delikely/">delikely</a>, Security Researcher and Tech Lead at QAX STARV Lab at <a href="/offbyoneconf/">Off-By-One Conference</a> 
He will be presenting his paper on "Unlocking Automotive Secrets - Strategies and Tool for accessing hidden services"
#carhacking
Off-By-One Conference (@offbyoneconf) 's Twitter Profile Photo

The rocket 🚀 continues fly high Off-By-One Conference , delikely delivered another great presentation for car-hacking enthusiasts and fellow offensive security fans with his paper. Go go go!

The rocket 🚀 continues fly high <a href="/offbyoneconf/">Off-By-One Conference</a> , <a href="/delikely/">delikely</a> delivered another great presentation for car-hacking enthusiasts and fellow offensive security fans with his paper.
Go go go!
Sam Curry (@samwcyo) 's Twitter Profile Photo

New writeup from ꙅɿɘƚɔɘqꙅ and I: we're finally allowed to disclose a vulnerability reported to Kia which would've allowed an attacker to remotely control almost all vehicles made after 2013 using only the license plate. Full disclosure: samcurry.net/hacking-kia