Posts
2717
Following
681
Followers
1506
"I'm interested in all kinds of astronomy."
repeated

Why are some people obsessed about reading the right way?

“You’re wasting your time if you’re not reading the classics” or “reading should be about sucking the marrow of the vast body literature” or “reading is about retaining information”

None of it is true. People read because they like reading. Maybe they like stories. Maybe they like words. Maybe they are learning something obscure. There are millions of different reasons or ways to read. Don’t let pedants steal your joy or soul.

Just read

7
10
0
[RSS] Everyday Ghidra: Symbols -- Prescription Lenses for Reverse Engineers -- Part 1

https://clearbluejar.github.io/posts/everyday-ghidra-symbols-prescription-lenses-for-reverse-engineers-part-1/
0
0
0
[RSS] Reverse engineering the Sega Channel game image file format

https://www.infochunk.com/schannel/index.html
0
0
1
repeated

Malimite is an iOS decompiler designed to help researchers analyze and decode IPA files https://github.com/LaurieWired/Malimite

0
4
0
repeated

Intel launched the Pentium processor in 1993. Unfortunately, dividing sometimes gave a slightly wrong answer, the famous FDIV bug. Replacing the faulty chips cost Intel $475 million. I reverse-engineered the circuitry and can explain the bug. 1/9

5
23
1
Writing down (and searching through) every UUID · eieio.games
https://eieio.games/blog/writing-down-every-uuid/

/via @filippo

#frombsky
0
4
2
@h2onolan I'm pretty sure it's ownership. See also how Kaspy got banned while CrowdStrike not.
0
0
2
repeated

Breaking the most popular Application Firewalls () in the market

https://nzt-48.org/breaking-the-most-popular-wafs

0
2
0
[RSS] Trying to Exploit My Old Android Device, take 2 (CVE-2020-0401, PackageManagerService)

https://pwner.gg/blog/Android%27s-CVE-2020-0401
0
1
2
"Good Red Team comes on slow. The first month is all waiting, then halfway through the second month you start cursing the service provider who burned you, because nothing is happening. And then... ZANG!" - Hunter CISO Thompson
0
2
7
repeated

I'll just leave this here for the real programmers.

3
4
0
repeated

Forward thinking was just the thing that made Multics what it is today.

— Erik Quanstrom

0
3
0
repeated

Santa brought new a blog post!

Handling Arbitrarily Nested Structures with

https://blog.silentsignal.eu/2024/12/06/custom-decoder-for-burp/

0
2
0
repeated

The competition compromises your C2 infrastructure and operator workstations.

"a longstanding campaign orchestrated by the Russian-based threat actor known as 'Secret Blizzard' (also referred to as Turla). This group has successfully infiltrated 33 separate command-and-control (C2) nodes used by Pakistani-based actor, 'Storm-0156.'"

https://blog.lumen.com/snowblind-the-invisible-hand-of-secret-blizzard/

0
2
0
repeated

@bagder @swapgs I highly recommend clicking through the demo at https://www.hackerone.com/hai-your-hackerone-ai-copilot

It's really really bad, even for the low bar of AI slop. It recommends using `X-XSS-Protection` (which is not a thing anymore), claims that calling `dangerouslySetInnerHTML` breaks the principle of least privilege, and then in a report about an SQL dump being publicly available it explains said dump by describing how a CREATE TABLE works without even catching on the fact that it's an export of the database in SQL format.

If the demo they present this with is so hilariously bad, I can only imagine what the real product is like.

2
5
1
[RSS] URL File NTLM Hash Disclosure Vulnerability (0day) - and Free Micropatches for it

https://blog.0patch.com/2024/12/url-file-ntlm-hash-disclosure.html
0
0
0
repeated

Pentagrid published two tags for (also Swiss AHV numbers) and for . These tags are available via the Hackvertor Tag Store by @garethheyes. Our blog post explains what these tags do and how they can be used. https://www.pentagrid.ch/en/blog/hackervertor-ean13-and-totp-tags-for-web-application-penetration-testing-with-burp/

1
4
0
repeated

CyberKaida (サイバーかいだ)

support for writing plugins! And it includes debugging from VSCode!

I am SO EXCITED! Thank you Ghidra team! 💜💜💜

https://github.com/NationalSecurityAgency/ghidra/commit/478d3e6331803ee3c4adda98a9a97e0acab7e242

1
6
1
Show older