Posts
3915
Following
728
Followers
1601
"I'm interested in all kinds of astronomy."
repeated

Learn to use a debugger that runs *beneath* the OS using Intel VT-x. Hidden hooks, TLB splitting, EPT-based monitoring: reverse engineering's secret weapon. Debuggers 3301: HyperDbg https://ost2.fyi/Dbg3301 by @intel80x86

0
3
0
repeated

🆕 The URL Pattern API is Newly Available!

Use it to match and extract parts of URLs, no need to reinvent routing logic. Supports literals, wildcards, named groups, and even regex constraints.

Learn how it works 👇
https://developer.mozilla.org/en-US/docs/Web/API/URL_Pattern_API

0
1
0
repeated
repeated

RE: https://toot.teckids.org/@nik/116540880770634816

As someone who has been programming since being a young teenager, things like this make me enormously sad.

If I was banned from being part of tech communities until the age of 16 or even 18 I would've never been able to learn all I did. I would've never been able to truly get into FOSS.

I would've never had a chance to become who I now am.

Age verification is literally killing the ability for kids and teens to excitedly participate and learn cool stuff and learn how to have digital agency.

5
17
0
repeated

RE: https://chaos.social/@SylvieLorxu/116549440329775404

This.

I grew up on forums like XDA developers and started posting there when I was like 11. It taught me English, taught me what software freedom is, got me to write my first few lines of code, share software with friends and like-minded people online, and made me who I am today.

We must fight to keep the communities that made us who we are. There is still a way forward.

0
2
0
repeated
@raptor I like to believe that people just deeply care about security researchers and they don't want to see us starving :)
1
0
4
repeated
We've Been Here Before: Decompilers, Fuzzers, and Now AI

https://www.clearseclabs.com/blog/weve-been-here-before-ai-vulnerability-research/
1
10
6
repeated

The FreeBSD team has patched a remote code execution in its operating system that impacts all versions released since 2005

Tracked as CVE-2026-42511, the vulnerability resides in the FreeBSD DHCP client and is extremely easy to exploit

https://aisle.com/blog/aisle-discovers-cve-2026-42511-a-21-year-old-freebsd-remote-command-execution-vulnerability

1
5
0
repeated
Remember the old 2600Hz thing and how much money it cost AT&T? In hindsight, it was so obviously dumb to put control signalling and user-data in the exact same channel. We'd learn from that, right? It's so obviously a terrible idea that can never work safely that we'd never do something that dumb again, right? RIGHT?!

Oh wait. That's pretty much standard operating procedure with AI agents. Just jam it all in the same context, what could possibly go wrong?! Surely it'll be OK this time, right?

*Bangs head on desk*
3
6
0
Periodic reminder that HuggingFace models can include code, thus possibly malware too

RE: https://mastodon.social/@campuscodi/116550201730434193
0
1
3
repeated

Where do the people hang that read our hacks blog post and then went through all of the bugs that we opened up? Really eager for the deeper, informed takes now :) https://hacks.mozilla.org/2026/05/behind-the-scenes-hardening-firefox/

4
2
0
Post-Quantum Cryptography
A Realistic Guide to Manage the Transition [PDF]

https://www.aumasson.jp/data/talks/pqcbha26.pdf
0
1
1
[RSS] Getting LLMs Drunk to Find Remote Linux Kernel OOB Writes (and More)

https://heyitsas.im/posts/drinking-llms/
0
1
0
repeated

“It looks like you’re building an off brand LEGO kit! Would you like help with that?”

2
7
0
Show older