Posts
3934
Following
728
Followers
1603
"I'm interested in all kinds of astronomy."
repeated
Edited 7 hours ago

Calif demonstrates a not-yet-fixed data-only macOS kernel LPE. MIE, which is available on M5 Macs, does not thwart the attack.
https://blog.calif.io/p/first-public-kernel-memory-corruption

0
2
0
repeated

bert hubert 🇺🇦🇪🇺🇺🇦

Yesterday I attended the first Democratic Tech Alliance (DTA) Assembly over at the European Parliament. The DTA is a political/think tank/civil society/industry initiative that hopes to foster a tech-ecosystem on which we can continue to run our European democracies. Because it is not looking good. Useful progress was made, and here is what I learned: https://berthub.eu/articles/posts/democratic-tech-alliance-may-2026/

1
3
0
repeated

TrendAI Zero Day Initiative

In a video highlight from Day 1 of Berlin, Orange Tsai of the DEVCORE Research Team takes on Microsoft Edge with a sandbox escape! He earns $175,000 and 17.5 Master of Pwn points. https://youtube.com/shorts/8ngMzEVrdVs?feature=share

0
2
0
repeated

TrendAI Zero Day Initiative

Nice work! Angelboy & TwinkleStar03 (@scwuaptx & @_twinklestar03) of DEVCORE Research Team + DEVCORE Internship Program was able to exploit Microsoft Windows 11! If confirmed, they win $30,000 and 3 Master of Pwn points. They're off to the disclosure room to explain how they did it.

0
2
0
@lina Proper automation has an upfront cost, and I think this is what ppl try to avoid. It's not uncommon that people wait for frontier models to get better at deciding on logical conditions instead of writing two if's...
0
1
7
repeated

Hoshino Lina (星乃リナ) 🩵 3D Yuri Wedding 2026!!!

I worked at a fairly big tech co years before the AI boom. People did large scale refractoring across huge code bases back then. With refactoring tools. And properly written robots.

Applying changes to code at scale, opening PRs automatically, basic interaction with human reviewers, making sure tests pass, getting things merged when ready. All that already existed before LLMs. And it was actually reliable and not capable of hallucinating terrible things.

It's like we've forgotten how to automate things without LLMs and openclaw now...

3
8
0
repeated

TrendAI Zero Day Initiative

Amaze! Amaze! Amaze! Orange Tsai of DEVCORE Research Team was able to exploit Edge with a sandbox escape! If confirmed, we wins $175K. He's off to the disclosure room to explain how he did it.

0
3
0
repeated

TrendAI Zero Day Initiative

Boom! Valentina Palmiotti wastes no time kicking off Berlin in style. She requires just a few second to get code execution on the NV Container Toolkit. She heads off to the disclosure room to provide all the details.

0
3
0
repeated
Edited 14 hours ago

I have published 3.4.0. Now you can install it in IDA by just running this:

$ hcli plugin install diaphora

https://github.com/joxeankoret/diaphora/releases/tag/3.4.0

2
3
1
repeated

A 0-click exploit chain for the Pixel 10: When a Door Closes, a Window Opens https://projectzero.google/2026/05/pixel-10-exploit.html

0
2
0
repeated
Edited 16 hours ago
2
2
5
@sassdawe "If a man promises to fix something, he'll fix it. No need to remind him every year!"
0
1
1
repeated
Edited 3 hours ago

Hey nerds!

I made a thing!

It's a "chore tracker*, but I took a somewhat unique take on the subject 🙈

It tracks when did you last completed a chore and how close are you to the desired frequency you set for that particular chore.

You can access it here: https://chores-mvp.azurewebsites.net/

There is policy as well. I hope it will answer most of the questions.

You can self-host it if you're into that sort of things, get it from GitHub: https://github.com/sassdawe/chores

PS: And let me know whether you played around with the Demo and did it spark joy?

6
3
0
repeated

The Junkyard Call for Bugs is officially open! 👾
www.districtcon.org/junkyard

For additional information, please reference our Disclosure Guidance doc: lnkd.in/ewjswJyf

And if you missed last years presentations, check them out on YouTube now: https://www.youtube.com/@DistrictCon/shorts

0
3
0
Edited yesterday
Officially lost track of Linux page cache LPE's - see also: "cache invalidation and naming things":

https://github.com/v12-security/pocs/tree/main/fragnesia

This is CVE-2026-46300
0
2
2
Show older