diff options
author | h0t_max <h0t_max@hotmail.com> | 2022-07-19 00:27:53 +0200 |
---|---|---|
committer | h0t_max <h0t_max@hotmail.com> | 2022-07-19 00:27:53 +0200 |
commit | 5c42300051091c6706ad53c50fd88e15c024bf60 (patch) | |
tree | 7515ad96d62ce17353a0a698a0aee8efbf6adba2 /README.md | |
parent | README fixed (diff) | |
download | MicrocodeDecryptor-5c42300051091c6706ad53c50fd88e15c024bf60.tar MicrocodeDecryptor-5c42300051091c6706ad53c50fd88e15c024bf60.tar.gz MicrocodeDecryptor-5c42300051091c6706ad53c50fd88e15c024bf60.tar.bz2 MicrocodeDecryptor-5c42300051091c6706ad53c50fd88e15c024bf60.tar.lz MicrocodeDecryptor-5c42300051091c6706ad53c50fd88e15c024bf60.tar.xz MicrocodeDecryptor-5c42300051091c6706ad53c50fd88e15c024bf60.tar.zst MicrocodeDecryptor-5c42300051091c6706ad53c50fd88e15c024bf60.zip |
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -20,7 +20,7 @@ Using vulnerabilities in Intel TXE we had activated undocumented debugging mode 4. Where can I find more information about it? -See our talks [Chip Red Pill: How We Achived to Execute Arbitrary Microcode Inside Inttel Atom CPUs](https://www.youtube.com/watch?v=V1nJeV0Uq0M&ab_channel=OffensiveCon) from OffensiveCon22. +See our talks [Chip Red Pill: How We Achived to Execute Arbitrary Microcode Inside Intel Atom CPUs](https://www.youtube.com/watch?v=V1nJeV0Uq0M&ab_channel=OffensiveCon) from OffensiveCon22. # Python |