53 Followers
34 Following
523 Posts
Security Analyst at Layakk
Permanent student
Kriware Security Feed: Feed of technical blogs about cybersecurity. -> Telegram Channel: https://t.me/kriwarefeed
YouTuber: kriware
RootedCON co-organizer
Webhttps://kriware.com/

CVE-2026-0047: Stealing Screenshots from Every Running App

Missing Android permission check lets any app dump UI bitmaps from running apps.

https://www.mobilehackinglab.com/blog/cve-2026-0047-activitymanager-eop-steal-images

#Android #EoP

0-Click RCE in Samsung's OpenAPV on Android 16

How a missing bounds check in Samsung's APV video codec leads to heap corruption on Android 16 — proved with OOB read/write PoCs, MP4 exploit on Android emulator, and 4 fuzzing approaches including AFL++.

Android APV 0-Click Overflow

Patch analysis shows malformed video files can trigger a heap overflow in Android’s APV codec, enabling zero-click RCE.

https://www.mobilehackinglab.com/blog/exploiting-android-apv-codec-0click-heap-overflow

#Android #0Click

0-Click RCE in Samsung's OpenAPV on Android 16

How a missing bounds check in Samsung's APV video codec leads to heap corruption on Android 16 — proved with OOB read/write PoCs, MP4 exploit on Android emulator, and 4 fuzzing approaches including AFL++.

Codex Hacked a Samsung TV

Researchers gave an AI a browser foothold on a TV, and it found a kernel path to root by abusing exposed memory-mapping drivers

https://blog.calif.io/p/codex-hacked-a-samsung-tv

#AI #tvOS #iot

Codex Hacked a Samsung TV

We gave Codex a foothold. It popped a root shell.

Calif

Homelable

A self-hosted homelab mapper that scans local networks, draws interactive topology diagrams, and shows live node status.

https://github.com/Pouzor/homelable

#Homelab #NetworkMapping

GitHub - Pouzor/homelable: Self-hosted homelab infrastructure visualizer — interactive network diagram with live status monitoring

Self-hosted homelab infrastructure visualizer — interactive network diagram with live status monitoring - Pouzor/homelable

GitHub

ELF & Dynamic Linking

Explains how Linux turns an ELF binary into a running process, covering execve, fork, file descriptors, syscalls, loaders, and memory mapping.

https://fmdlc.github.io/tty0/Linux_ELF_Dynamic_linking_EN.html

#Linux #ELF

ELF & Dynamic Linking (EN)

Compiling Android Kernel for my OnePlus Device

A researcher explains how to build, flash, and debug a custom Android kernel for mobile kernel research.

https://pwner.gg/blog/2026-04-03-android-custom-kernel

#Android #Kernel

Compiling Android Kernel for my OnePlus Device

Compiling Android Kernel for my OnePlus Device

( ͡◕ _ ͡◕)👌

FLARE Learning Hub

Free hub with reverse engineering, malware analysis, labs, and debugging modules for hands-on Windows x64 training.

https://github.com/mandiant/flare-learning-hub

#ReverseEngineering #MalwareAnalysis

GitHub - mandiant/flare-learning-hub: Free educational content on reverse engineering and malware analysis from the FLARE team

Free educational content on reverse engineering and malware analysis from the FLARE team - mandiant/flare-learning-hub

GitHub

Claude Code in Action Course

Teaches how to use Claude for coding tasks, covering workflows, prompt design, and practical development use cases.

https://anthropic.skilljar.com/claude-code-in-action

#LLM #Coding

Claude Code in Action

Integrate Claude Code into your development workflow

Anthropic

MCP Course on Model Context Protocol

Introduces concepts and hands-on labs to understand MCP, enabling structured interaction between models and external tools.

https://huggingface.co/mcp-course

#LLM #AI

mcp-course (Hugging Face MCP Course)

Model Context Protocol, AI Agents, Python, Typescript

Firmware Teardown Confirms Hidden Features

Researchers reverse firmware, uncover hidden debug features and attack surface exposing risks in embedded devices.

https://blog.quarkslab.com/nerd-life-weeks-firmware-teardown-we-were-right.html

#Firmware #Embedded

A Nerd's Life: Weeks of Firmware Teardown to Prove We Were Right - Quarkslab's blog

In a blog post published last December, we demonstrated how we managed to extract the firmware from a smartwatch by exploiting an out-of-bounds read vulnerability and spying on its screen interface. Follow us on our long and unexpected journey to figure out how this smartwatch can measure heart rate or blood pressure with no visible sensor, the problems we encountered while analyzing its firmware, and how we solved them to uncover The Truth about this device.