René's URL Explorer Experiment


Title: ODS Security Research - Nolen Johnson – Just a guy, breaking your Connected System(s), sometimes intentionally.

Description: Just a guy, breaking your Connected System(s), sometimes intentionally.

Open Graph Description: Just a guy, breaking your Connected System(s), sometimes intentionally.

Mail addresses
odd.solutions.fl@gmail.com

direct link

Domain: oddsolutions.github.io

NoneIE=edge
authorODS Security Research - Nolen Johnson

Links:

https://oddsolutions.github.io/
ODS Security Research - Nolen Johnsonhttps://oddsolutions.github.io/
Bloghttps://oddsolutions.github.io/
Abouthttps://oddsolutions.github.io/about
Pixel Tablet Dock (korlan) Secure Boot Bypasshttps://oddsolutions.github.io/Pixel-Tablet-Dock-Secure-Boot-Bypass/
korlan-secure-boot-bypasshttps://github.com/oddsolutions/korlan-secure-boot-bypass/
Read Morehttps://oddsolutions.github.io/Pixel-Tablet-Dock-Secure-Boot-Bypass/
Fault Injection and the Supply Chainhttps://oddsolutions.github.io/Fault-Injection-And-The-Supply-Chain/
Read Morehttps://oddsolutions.github.io/Fault-Injection-And-The-Supply-Chain/
Chromecast with Google TV (1080P) Secure-Boot Bypasshttps://oddsolutions.github.io/Chromecast-with-Google-TV-1080P-Secure-Boot-Bypass/
Read Morehttps://oddsolutions.github.io/Chromecast-with-Google-TV-1080P-Secure-Boot-Bypass/
Android Debugging Crash Coursehttps://oddsolutions.github.io/Android-Debugging-Crash-Course/
Read Morehttps://oddsolutions.github.io/Android-Debugging-Crash-Course/
Spotify Car Thing - Root and Custom OS toolkithttps://oddsolutions.github.io/Spotify-Car-Thing-Root/
superbird-bulkcmdhttps://github.com/oddsolutions/superbird-bulkcmd
Read Morehttps://oddsolutions.github.io/Spotify-Car-Thing-Root/
Google (Askey) ADT-3 - Secure Boot Bypasshttps://oddsolutions.github.io/ADT-3-Secure-Boot-Bpass/
Read Morehttps://oddsolutions.github.io/ADT-3-Secure-Boot-Bpass/
Chromecast with Google TV (4K) - Persistent Secure Boot Bypasshttps://oddsolutions.github.io/Chromecast-with-Google-TV-Bootloader-Unlock/
sabrina-unlockhttps://github.com/oddsolutions/sabrina-unlock
Read Morehttps://oddsolutions.github.io/Chromecast-with-Google-TV-Bootloader-Unlock/
Working with SELinux on Androidhttps://oddsolutions.github.io/Working-with-SELinux-on-Android/
Read Morehttps://oddsolutions.github.io/Working-with-SELinux-on-Android/
Qualcomm's Chain of Trusthttps://oddsolutions.github.io/Qualcomm-Firmware/
Read Morehttps://oddsolutions.github.io/Qualcomm-Firmware/
Samsung Galaxy S4 (Qualcomm APQ8064) - Persistent Secure Boot Bypasshttps://oddsolutions.github.io/Galaxy-S4-Research/
Read Morehttps://oddsolutions.github.io/Galaxy-S4-Research/
ZTE Majesty - Root and Write Protection Exploitshttps://oddsolutions.github.io/Write-Protection-Woes/
Read Morehttps://oddsolutions.github.io/Write-Protection-Woes/
Hello Worldhttps://oddsolutions.github.io/Hello-World/
Read Morehttps://oddsolutions.github.io/Hello-World/
https://github.com/oddsolutions
https://www.linkedin.com/in/https://www.linkedin.com/in/nolen-j-58895911b/
https://www.twitter.com/nolenjohnson

Viewport: width=device-width, initial-scale=1.0, maximum-scale=1.0


URLs of crawlers that visited me.