Posts
3368
Following
712
Followers
1580
"I'm interested in all kinds of astronomy."
repeated
Hungarian astronaut Tibor Kapu is on his way to space on Ax-4 \o/

https://www.youtube.com/watch?v=YAue1QljRg4
0
0
2
repeated

๐Ÿ‘‰๐Ÿฝ Check out this in-depth video of @nmatt0 reversing the firmware decryption mechanism used in a Hanwha security camera with IDA Pro. Bonus: He's also written an accompanying blog post packed with code samples, screenshots, and more!

https://hex-rays.com/blog/reversing-hanwha-security-cameras-a-deep-dive-by-matt-brown

0
3
0
repeated
Edited 7 months ago

This is very aggressively (perhaps too aggressively) stated, but he's absolutely right. People are all worried their ideas are gonna be "stolen", and my friends, I can assure you that won't be the problem.

5
8
0
repeated
repeated

i love css ๐Ÿ’–

also shoutout to Fastmail for rolling out fixes for both reports in <48h
https://www.fastmail.com/bug-bounty/

1
2
1
#IBMi is affected by a user gaining elevated privileges due to an unqualified library call vulnerability in IBM Facsimile Support for i [CVE-2025-36004]

https://www.ibm.com/support/pages/node/7237732

Another one by @silentsignal !
0
0
0
[RSS] CFCamp 2025 Slides - Understanding CFML Vulnerabilities, Exploits, and Attack Paths

https://www.hoyahaxa.com/2025/06/cfcamp-2025-slides-understanding-cfml.html

#coldfusion
0
0
1
I updated the generated #Ghidra documentation I host for 11.4:

https://scrapco.de/ghidra_docs/

Here's the documentation for Decompiler Taint Operations:

https://scrapco.de/ghidra_docs/Features/DecompilerDependent/DecompilerTaint/DecompilerTaint.html
0
0
1
#Ghidra 11.4 released with support for (external) taint engines in the decompiler:

https://github.com/NationalSecurityAgency/ghidra/releases/tag/Ghidra_11.4_build
1
4
6
repeated

๐Ÿ“ข @ERNW is preparing the venue for tomorrow's launch of in ! See you soon people! We are super excited! ๐Ÿฅณ

0
2
1
@Viss @neurovagrant @dangoodin I think a better analogy would be Stagefright where target diversity was a major factor blocking widespread abuse IIRC: based on my recent experiments with side-channels, target HW can have significant effects.

FTR, this is an example of targeting end-user applications:

https://www.youtube.com/watch?v=ugZzQvXUTIk

And don't forget: as SW mitigations (or even HW assisted ones) get better, attackers may turn to more "painful" alternatives...
0
1
1
[RSS] Abusing copyright strings to trick software into thinking it's running on your competitor's PC

https://devblogs.microsoft.com/oldnewthing/20250624-00/?p=111299

#warez
0
0
3
repeated
repeated

ใ‚ทใƒฃใƒใ‚ณ๐ŸŒต

VSCode ใฎใ‚ฟใƒผใƒŸใƒŠใƒซใ‚‚ Sixel ๅฏพๅฟœใ—ใฆใŸใฎใ‹ (terminal.integrated.experimentalImageSupport ใ‚’ๆœ‰ๅŠนใซใ™ใ‚‹ใจ่กจ็คบใ•ใ‚Œใ‚‹)

0
1
0
repeated

"We will respond to you in 5 days"

3 weeks later... No response.

Anyone who gets mad at people for going full disclosure has never had to deal with the bureaucratic maze of trying to get people to fix their things.

1
4
0
Show older