The Neodyme Blog
 
 Pwn2Own Ireland 2024: QNAP Qhora-322
 Lenovo DCC: Part 1 - A simple ACL Exploit
 Building Our Own Post-Quantum FIDO Token
 Did You Train on My Voice? Exploring Privacy Risks in ASR
 Your router might be a security nightmare: Tales from Pwn2Own Toronto 2022
 Riverguard: Mutation Rules for Finding Vulnerabilities
 Pwn2Own Ireland 2024: Canon imageCLASS MF656Cdw
 HTML to PDF Renderer: A tale of local file access and shellcode execution
 The Key to COMpromise - Writing to the Registry (again), Part 4
 The Key to COMpromise - Downloading a SYSTEM shell, Part 3
 Introducing HyperHook: A harnessing framework for Nyx
 The Key to COMpromise - Abusing a TOCTOU race to gain SYSTEM, Part 2
 Windows BitLocker -- Screwed without a Screwdriver
 On Secure Boot, TPMs, SBAT, and downgrades -- Why Microsoft hasn't fixed BitLocker yet
 The Key to COMpromise - Pwning AVs and EDRs by Hijacking COM Interfaces, Part 1
 Solana Consensus - From Forks to Finality
 From Guardian to Gateway: The Hidden Risks of EDR Vulnerabilities
 RCE on the HP M479fdw printer