diff options
author | h0t_max <h0t_max@hotmail.com> | 2022-07-19 00:27:53 +0200 |
---|---|---|
committer | h0t_max <h0t_max@hotmail.com> | 2022-07-19 00:27:53 +0200 |
commit | 5c42300051091c6706ad53c50fd88e15c024bf60 (patch) | |
tree | 7515ad96d62ce17353a0a698a0aee8efbf6adba2 | |
parent | README fixed (diff) | |
download | MicrocodeDecryptor-main.tar MicrocodeDecryptor-main.tar.gz MicrocodeDecryptor-main.tar.bz2 MicrocodeDecryptor-main.tar.lz MicrocodeDecryptor-main.tar.xz MicrocodeDecryptor-main.tar.zst MicrocodeDecryptor-main.zip |
-rw-r--r-- | README.md | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -20,7 +20,7 @@ Using vulnerabilities in Intel TXE we had activated undocumented debugging mode 4. Where can I find more information about it? -See our talks [Chip Red Pill: How We Achived to Execute Arbitrary Microcode Inside Inttel Atom CPUs](https://www.youtube.com/watch?v=V1nJeV0Uq0M&ab_channel=OffensiveCon) from OffensiveCon22. +See our talks [Chip Red Pill: How We Achived to Execute Arbitrary Microcode Inside Intel Atom CPUs](https://www.youtube.com/watch?v=V1nJeV0Uq0M&ab_channel=OffensiveCon) from OffensiveCon22. # Python |