Posts
2478
Following
663
Followers
1488
"I'm interested in all kinds of astronomy."
"You possessive apostrophe!" - sounds like a great insult!
0
1
3
repeated

๐—๐—ผ๐—ถ๐—ป ๐—ผ๐˜‚๐—ฟ ๐—น๐—ถ๐˜ƒ๐—ฒ ๐˜„๐—ฒ๐—ฏ๐—ถ๐—ป๐—ฎ๐—ฟ ๐—ผ๐—ป ๐— ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐Ÿฒ๐˜๐—ต!
Discover how to eliminate debugging inefficiencies and accelerate vulnerability research with time travel analysis.

Register now ๐Ÿ‘‡
https://www.linkedin.com/events/exploitingaroutervulnerabilityw7299810055170805761/

0
2
0
[RSS] Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit

https://icode4.coffee/?p=1081
0
1
1
[RSS] ENOMEM In Linux Kernel

https://u1f383.github.io/linux/2025/03/04/enomem-in-linux-kernel.html

"In this article, I will explore the feasibility of precisely managing memory usage within the Linux kernel" CVE-2023-2236
0
1
2
repeated

I wonder what the person who took that famous photo of the Doge Shiba Inu makes of all this now?

0
6
0
dae69e7cae50e60bb184359e5e4a3a91fb7045378fdd0be36a043e9634c5b952
0
0
4
repeated
@cR0w context please?
0
0
1
repeated

Adapt to removal of Windows Arm32 .NET debugging

> .NET support for Windows on Arm32 has ended. Debugging support for this platform will be removed from Visual Studio 2022 starting with the 17.14 update.

https://learn.microsoft.com/en-us/visualstudio/debugger/adapt-to-removal-of-windows-arm32-dotnet-debugging?view=vs-2022

0
1
0
repeated

I'm excited to share CVE Crowd's Top 5 Vulnerabilities from February 25!

These five stood out among the 352 CVEs actively discussed across the Fediverse.

For each CVE, Iโ€™ve included a standout post from the community.

Enjoy exploring! ๐Ÿ‘‡

1
3
0
repeated

Listen, I'm not going to pretend that I'm even remotely surprised, but I will tell you that this is a slap in the face to every person in the infosec community that has worked to track and thwart Russian APTs for the last several decades.

https://www.theguardian.com/us-news/2025/feb/28/trump-russia-hacking-cyber-security

5
9
0
repeated

Happy to all who celebrate.

It took me a whole year to finally upload last year's jam...

https://music.axwax.eu/axwax-303-day-2024/

0
3
0
repeated

it's missing ๐Ÿ”œ eth0 ๐ŸŽƒ

Edited 6 months ago

today, i have IP-blocked the entirety of alibaba cloudโ€™s IPv4 range (47.80.0.0/13, 47.74.0.0/15, 47.76.0.0/14). And you could ask - domi, what the hell, thatโ€™s kinda sorta a lot of addresses?

fucking watch this: thatโ€™s sakamoto Mk5, my Ryzen 9 7950X3D server. Never before have I seen forgejo taking this much CPU.

Theyโ€™ve generated 9GB of access logs (!) and 230GB of generated tarballs (!!!) before I got to my laptop, investigated and ip-banned them. Iโ€™m positive that most forgejo deployments in existence wouldnโ€™t survive this.

If you needed another reason to fuck generative AI today - hereโ€™s one

3
9
0
repeated

bert hubert ๐Ÿ‡บ๐Ÿ‡ฆ๐Ÿ‡ช๐Ÿ‡บ๐Ÿ‡บ๐Ÿ‡ฆ

So I didn't know, but Europe already has a backup of PubMed, the database of biomedical research publications. The US PubMed broke down over the weekend. And here is our alternative: https://europepmc.org/

1
17
0
repeated

@buherator kdnet has had support for the virtio NIC for years.

In Windows just configure kdnet as you would with any other supported NIC and, in QEMU, configure the virtual NIC as

-netdev user,id=net0 -device virtio-net,netdev=net0,disable-legacy=on

1
1
1
repeated

๐Ÿš€ New Blog & PoC Release: Abusing IDispatch for COM Object Access & PPL Injection ๐Ÿš€
I've developed a PoC exploit that demonstrates an interesting bug class in COM servers implementing IDispatch, allowing indirect object creation within the target process. Specifically, by leveraging the ability to instantiate STDFONTโ€”a legacy COM class not designed for cross-process useโ€”I was able to achieve code injection into a Windows PPL (Protected Process Light) process. This technique enables interaction with protected processes like LSASS.
This research builds on the work of @tiraniddo who identified how COM object manipulation via IDispatch can lead to unexpected process interactions. My PoC takes this concept further by demonstrating its practical impact through registry manipulation and .NET payload execution inside PPL processes.
๐Ÿ” Blog Post: https://mohamed-fakroud.gitbook.io/red-teamings-dojo/abusing-idispatch-for-trapped-com-object-access-and-injecting-into-ppl-processes
๐Ÿ’ป PoC & Source Code: https://github.com/T3nb3w/ComDotNetExploit
Key Highlights:
๐Ÿ”น Exploiting IDispatch in OOP COM servers
๐Ÿ”น Abusing STDFONT instantiation for process injection
๐Ÿ”น Achieving code execution inside PPL and accessing LSASS
๐Ÿ”น Bypassing SEC_IMAGE integrity checks
๐Ÿ”น Leveraging OnlyUseLatestCLR for compatibility

1
6
0
repeated

I keep hearing that Sup shouldn't exist because X exists.

I made Sup to replace Snapchat and Facebook Messenger in my own friend group

I think it might be useful to other friend groups or families too, being that you can join with an email or Pixelfed/Loops or Mastodon account

Not only that, but Sup will be modular, allowing for rich integration with pretty much any other chat platform (Signal, Matrix, Delta, etc)

It's like Beeper, but federated and open source. ๐Ÿš€

0
3
0
[RSS] A Series of io_uring pbuf Vulnerabilities

https://u1f383.github.io/linux/2025/03/02/a-series-of-io_uring-pbuf-vulnerabilities.html

CVE-2024-0582, CVE-2024-35880, ???
0
0
1
Show older