I live streamed some hax. If you're keen, you can see the archive here: https://www.youtube.com/watch?v=bwjEefE-NPk
Collection of tweets about Shadow Brokers auction file tools: https://twitter.com/i/moments/850725759895339009
Using TRITON DLP TO BYPASS TRITON DLP https://sensepost.com/blog/2017/the-triton-wont-protect-you-from-our-punches/
https://googleprojectzero.blogspot.ch/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html - fantastic work by Gal Beniamini.
Official Project Zero blog entry about the Broadcom kerfuffle: https://googleprojectzero.blogspot.ch/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html (via https://twitter.com/benhawkes/status/849288434506018816)
@buherator I quote (since we have the space, finally):
Released April 3, 2017
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: An attacker within range may be able to execute arbitrary code on the Wi-Fi chip
Description: A stack buffer overflow was addressed through improved input validation.
CVE-2017-6975: Gal Beniamini of Google Project Zero
J00ru's Another bug documented: Windows Kernel Local Denial-of-Service #4: nt!NtAccessCheck and family (Windows 8-10), http://j00ru.vexillium.org/?p=3225 .
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural
seriously thinking about fuzzing my brain, Did it; found loads of memory leaks
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!