Posts
2505
Following
650
Followers
1469
"I'm interested in all kinds of astronomy."
[RSS] Exploring possible solutions to the inconsistency in how Windows searches case-insensitively for named resources

https://devblogs.microsoft.com/oldnewthing/20250723-00/?p=111403
0
0
1
repeated
repeated

«Alan Turing Institute scraps diversity drive under pressure from ministers»

Funny change in tune for an institute that was named after a person that was basically killed by the UK government for being gay. 🤷

https://archive.ph/JkOgI#selection-2204.0-2204.1

2
8
0
repeated

Want to make the most of the upcoming research drop? We've just updated https://http1mustdie.com/ with links to essential pre-read/watch resources. Enjoy!

0
3
0
Invision Community <= 4.7.20 (calendar/view.php) SQL Injection Vulnerability [CVE-2025-48932]

https://karmainsecurity.com/KIS-2025-06

(Also an XSS @ KIS-2025-05, CVE-2025-48933)
0
0
1
Interview with Senior DevOps engineer 2025

https://youtu.be/rXPpkzdS-q4

Programmers are Also Human is usually great, but this one is just hysterical xD
0
4
7
repeated

LOL. Funny bug to make it to prod.

https://httpd.apache.org/security/vulnerabilities_24.html

A bug in Apache HTTP Server 2.4.64 results in all "RewriteCond expr ..." tests evaluating as "true".

1
3
0
repeated
Edited 7 days ago

I'm happy to announce that HyperDbg v0.14 is released!

This version includes HyperEvade (beta preview), fixes Win11 24H2 compatibility issues & adds multiple timing functions to the script engine (Special thanks to @0Xiphorus )

Check it out: https://github.com/HyperDbg/HyperDbg/releases/tag/v0.14

More info on HyperEvade: https://github.com/HyperDbg/slides/blob/main/2025/DEBT2025/hyperevade-ecoop2025-debt.pdf

Microsleep function:
https://docs.hyperdbg.org/commands/scripting-language/functions/timings/microsleep

and RDTSC/RDTSCP:
https://docs.hyperdbg.org/commands/scripting-language/functions/timings/rdtsc

https://docs.hyperdbg.org/commands/scripting-language/functions/timings/rdtscp

Thanks to Tara for making this painting for us (it's not AI-generated).

0
2
0
[RSS] The Guest Who Could: Exploiting LPE in VMWare Tools

https://swarm.ptsecurity.com/the-guest-who-could-exploiting-lpe-in-vmware-tools/

CVE-2025-22230 CVE-2025-22247
0
1
5
repeated

@buherator Thanks!

The new fuzzer is live and found two JIT crashes, so it's met the goal of being better than an idle core in practice :)

https://github.com/devdanzin/lafleur/

0
1
1
[RSS] How We Accidentally Discovered a Remote Code Execution Vulnerability in ETQ Reliance

https://slcyber.io/assetnote-security-research-center/how-we-accidentally-discovered-a-remote-code-execution-vulnerability-in-etq-reliance/

CVE-2025-34140 CVE-2025-34141 CVE-2025-34142 CVE-2025-34143
0
0
1
[RSS] Reverse Engineering Security Products: Developing an Advanced Tamper Tradecraft (BHMEA24 slides)

https://github.com/emcalv/BlackHat-MEA-2024-slides/blob/main/BH%20MEA%202024%20-%20Reverse%20Engineering%20of%20Security%20Products_%20Defender.pdf
0
0
2
repeated

Shared the PoC with @mkolsek few days ago, the same one I gave to microsoft. Unlike microsoft however, they not only verified the issue within days but refined it demonstrating that ANY domain user can crash a fully patched windows 2025 server as of now.
https://bird.makeup/users/0patch/statuses/1947674442772910437

1
3
0
repeated
repeated
Edited 7 days ago

In memory of Ozzy Osbourne, we replay our review of Technical Ecstasy, an often overlooked album from his era of Black Sabbath that is among our favorites at CatSynth. We extend our thoughts to his family, friends, and colleagues 😿
https://youtu.be/vklyJuPbilY

0
2
0
repeated

Banana ozzy deployed to usher gk through a period of mourning salute

2
4
0
repeated

I am excited to share this new single-header C library I have been working on for a while now: vecmath.h, a comprehensive vector/matrix math library for graphics/games/3d.
It allows you to write vector math code in C that looks like this:

2
4
0
repeated
repeated

I don't know which update specifically, but in a recent update of 24H2 it looks like the Win32k system call table is protected by Kernel Data Protection (read-only SLAT entry)! I believe CI!g_CiOptions and msseccore's SecKdpSe PE section were the only things using it before.

0
2
0
Show older