Binary Ninja 5.3 (Jotunheim) adds new architecture APIs for full function level lifting. We are already using them for upcoming TMS320C6x work, and plugin authors should be able to put them to good use too. Also new: NDS32 and AArch64 ILP32 ABI updates. Check out the latest blog: https://binary.ninja/2026/04/13/binary-ninja-5.3-jotunheim.html#architecture--platform
btw y'all should* write cracks for software you use, even (and especially) if you paid for it
it's a good reversing exercise and you'll thank yourself when the licensing server has an outage or some company doesn't like your new motherboard
(*only if you can do it legally)
The fuzzer that found https://project-zero.issues.chromium.org/issues?q=componentid:1638259%20%22V8%20Sandbox%20Bypass%22 (and a number of issues prior to that as well) is now open-source: https://crrev.com/c/7580844
It uses pkeys, trap-handling and single-stepping to intercept and mutate in-sandbox reads (see trap-fuzzer.h for details). Definitely had fun writing it!
Did you know that `ipsw` has had a secret sandbox decompiler hidden in it for ~4 years? 🤫 Well now it's public 🙌
Check it out and let me know what you think! 🎉
#GirlsDay 2026 at MPL and MPZPM – experience science up close!
With our participation we want to get more girls excited about #science. We show them that #physics, #technology and #research offer diverse and thrilling career opportunities.
They get the opportunity to step into the role of scientist, engineer and lab technician for a day. MPL and MPZPM open their doors on April 23 – offering hands-on experiments, lab tours and real insights into cutting-edge research.
👉 https://mpl.mpg.de/de/news/artikel/wissenschaft-hautnah-erleben-girlsday-2026-am-mpl-und-mpzpm
no vibes just a lot of IDA Pro debugging MAME and hunting down as much info that’s surfaced in the past… 42 years as possible (thanks, Atari of Ireland file cabinet contents)
I mapped out enough of the Atari System 1 BIOS to create a cartridge ROM that the motherboard will boot and that calls some fancy printing functions. The blinking, teletype, banner effects are from the BIOS but the fade in/fade out effect I had to hook up myself through palette registers at VBLANK interrupt time.
I've been seeing this extension all over and wasn't sure exactly what folks were doing. Turns out, they weren't doing anything. Claude for Desktop is secretly installing this thing that activates when one of three other extensions are also present.
Finally, it is published 😁 Making Vulnerable Drivers Exploitable Without Hardware - my latest research on driver vulnerability hardware-gating, explaining the concept of hardware-dependent code and diving deep into creative deployment techniques - software-emulated phantom devices, driver restacking, and forced driver replacement — all explored through the lens of Bring Your Own Vulnerable Driver (BYOVD) attacks:
https://atos.net/wp-content/uploads/2026/04/atos-byovd-article.pdf
Happy Bicycle Day to all who celebrate! On this date in 1943, Albert Hofman took the LSD off the shelf that synthesized five years previously, ingested 0.25 milligrams and then rode his bicycle on the first LSD trip. #psychedelics
https://en.wikipedia.org/wiki/History_of_lysergic_acid_diethylamide#%22Bicycle_Day%22
@joern @bagder this https://blog.yossarian.net/2026/04/11/Brocards-for-vulnerability-triage#no-vuln-outside-usage by @yossarian is great for this.
The folks at iTerm2 figured out a way to get arbitrary code execution as the result of cat <file>, which is... impressive?