Firmware Exploitation with JEB: Part 1 (x-post from /r/reverseengineering)In Network Security by RandomRaineAugust 21, 2017Leave a Comment submitted by /u/svieg [link] [comments] Source: Net SecRelated