Malimite is an iOS decompiler designed to help researchers analyze and decode IPA files https://github.com/LaurieWired/Malimite
Intel launched the Pentium processor in 1993. Unfortunately, dividing sometimes gave a slightly wrong answer, the famous FDIV bug. Replacing the faulty chips cost Intel $475 million. I reverse-engineered the circuitry and can explain the bug. 1/9
I'll just leave this here for the real programmers.
Forward thinking was just the thing that made Multics what it is today.
β Erik Quanstrom
Santa brought new a blog post!
Handling Arbitrarily Nested Structures with #BurpSuite
https://blog.silentsignal.eu/2024/12/06/custom-decoder-for-burp/
The competition compromises your C2 infrastructure and operator workstations.
"a longstanding campaign orchestrated by the Russian-based threat actor known as 'Secret Blizzard' (also referred to as Turla). This group has successfully infiltrated 33 separate command-and-control (C2) nodes used by Pakistani-based actor, 'Storm-0156.'"
https://blog.lumen.com/snowblind-the-invisible-hand-of-secret-blizzard/
@bagder @swapgs I highly recommend clicking through the demo at https://www.hackerone.com/hai-your-hackerone-ai-copilot
It's really really bad, even for the low bar of AI slop. It recommends using `X-XSS-Protection` (which is not a thing anymore), claims that calling `dangerouslySetInnerHTML` breaks the principle of least privilege, and then in a report about an SQL dump being publicly available it explains said dump by describing how a CREATE TABLE works without even catching on the fact that it's an export of the database in SQL format.
If the demo they present this with is so hilariously bad, I can only imagine what the real product is like.
Pentagrid published two #Hackvertor tags for #EAN13 (also Swiss AHV numbers) and #TOTP for #2FA. These tags are available via the Hackvertor Tag Store by @garethheyes. Our blog post explains what these tags do and how they can be used. https://www.pentagrid.ch/en/blog/hackervertor-ean13-and-totp-tags-for-web-application-penetration-testing-with-burp/ #pentest #OWASP
#VSCode support for writing #Ghidra plugins! And it includes debugging from VSCode!
I am SO EXCITED! Thank you Ghidra team! πππ
https://github.com/NationalSecurityAgency/ghidra/commit/478d3e6331803ee3c4adda98a9a97e0acab7e242
The IBM Hyper Text Editing System console from 1969 https://commons.wikimedia.org/wiki/File:HES_IBM_2250_Console_grlloyd_Oct1969.png