Search results

Jump to: navigation, search
  • ...losed. For an account contact [[User:User890104|User890104]] or [[User:Q3k|q3k]]. * {{#dateformat:2023-01-07}} - [https://social.hackerspace.pl/@q3k/109655916469636189 A preliminary U-Boot port to the Nano 5G has been develo
    8 KB (1,132 words) - 17:41, 4 May 2024
  • ...ce are they supported. Some of these appear to have no cross-references in q3k's decompilation, but that might be a tooling issue. Ideally, we should test
    6 KB (650 words) - 17:12, 12 February 2023
  • ...720 Bootrom|Bootrom]] vulnerability discovered and exploited by [[User:Q3k|q3k]] in December 2021. It allows code execution in the bootrom over USB.
    3 KB (543 words) - 19:23, 9 January 2023
  • [[User:Q3k|q3k]] maintains a Ghidra server with iPod binaries. Access available on request
    196 bytes (28 words) - 18:44, 9 January 2023
  • [ 0.000000] Linux version 6.2.0-rc4-00476-g4c4af4d7e53c (q3k@mimeomia) (arm-none-eabi-gcc (GNU Arm Embedded Toolchain 10.3-2021.10) 10.3
    4 KB (583 words) - 15:31, 19 February 2023