Posts
2465
Following
555
Followers
1264
A drunken debugger

Heretek of Silent Signal
@Viss the more time I spend in this profession (or on this planet?) the more I recognize how rare those moments are
1
1
2
repeated

it is always a pleasure talking with sharp people who know what they're doing

1
2
1
repeated

FreddyB Aviation Photography

Possible Bird Strike? USN E-2C flies into a flock of seagulls while working the pattern at Pt. Mugu. Note the blowup it appears part of the wing starting to wrap around the prop

1
1
0
repeated

Did you vote in America yesterday? If so, you just got doxed

This site takes voter records that can be hard to source and puts them all into one place. Name, address, voter history, for free. It turns voting into a privacy and security risk https://www.404media.co/voted-in-america-this-site-doxed-you/

4
4
0
repeated

firefox We just released our Q2 & Q3 updates to the Mozilla Firefox Bug Bounty Hall of Fame. You can now find all the brilliant security researchers that helped secure Firefox in the last couple of quarters. https://www.mozilla.org/en-US/security/bug-bounty/hall-of-fame/. Thank you!

(The Mozilla web sites & services hacker hall of fame is continuously updated and available at https://hackerone.com/mozilla/hacktivity)

0
3
0
@tmr232 I think that'd be in the release documents, and I can't find anything promising when searching for .py's either. But that's just a quick look.
1
0
2
Generated docs for the latest #Ghidra 11.2.1 are now available at:

https://scrapco.de/ghidra_docs/

Differences from previous version:

https://gist.github.com/v-p-b/fb76fae8cbcb490a33039892c3feea9b
1
1
0
@da_667 "gone" is a bit strong phrase to use when everyone is free to copy your stream for a whole week
0
0
0
repeated
repeated

and here's how we worked on the recent CVE from it first being reported until published earlier today: https://hackerone.com/reports/2764830

0
1
0
@Viss best reaction I've seen so far xD
0
0
1
Edited 18 days ago
Dear Developers,

if you write #documentation, include the *context* where a piece of code/config/prayer/... should go, pretty please!

Thank you,

Your Fellow IT People
0
1
3
[oss-security] shell wildcard expansion (un)safety

https://seclists.org/oss-sec/2024/q4/56
1
1
2
repeated

CVE-2024-9681 HSTS subdomain overwrites parent cache entry

https://curl.se/docs/CVE-2024-9681.html

0
1
0
[RSS] On the limits of time travel in the face of undefined behavior in C

https://devblogs.microsoft.com/oldnewthing/20241104-00/?p=110466
0
0
0
repeated
New assessment for topic: CVE-2024-35250

Topic description: "Windows Kernel-Mode Driver Elevation of Privilege Vulnerability ..."

"The ks.sys driver on Windows is one of the core components of Kernel Streaming and is installed by default ..."

Link: https://attackerkb.com/assessments/b966571c-c90a-4055-af54-ee6af8389f53
0
1
0
repeated

Exciting news! I’m starting X-Force’s new offensive research team (XOR) and hiring a security researcher. Want to work with researchers (like @fuzzysec and I) to find bugs, exploit popular targets, and share your work? Apply for this unique (remote) role 😊https://careers.ibm.com/job/21219320/security-researcher-san-jose-ca/

1
2
0
Show older