Posts
2488
Following
654
Followers
1479
"I'm interested in all kinds of astronomy."
@loke @bagder As pentesters we regularly argued about whether a behavior can be considered a vulnerability or not. A resolution strategy that almost always worked is to ask ourselves what our recommended fix would be. Maybe including such a question in the report template could help prevent/resolve similar misunderstandings?
1
0
1
@bagder I started by tracking back line numbers, good for you to have some experience with the curl API :)
0
0
2
@bagder Attached fuzzer not matching with the provided ASAN report is an especially nice touch...
1
0
4
repeated

Meanwhile, if you abuse the API and don't comply, asan might complain but that's not a security problem.

https://hackerone.com/reports/3302518

2
1
0
repeated

Any fool can write code that a computer can understand. Good programmers write code that humans can understand.

— Martin Fowler

2
5
0
repeated
Edited yesterday

No CPU Challenge by Demostue Allst★rs

Evoke 2025 party Alternative Platforms compo winner.

An Amiga AGA demo that entirely runs on the copper. This is the same capture from real hardware, that was presented in the compo.

https://youtu.be/OXT5MrDdyB8
https://www.pouet.net/prod.php?which=104753

(Edit: updated YouTube link, due to audio sync issues)

1
3
0
repeated
repeated
wrote a new big blog post today that is very relevent to my interests. you may be interested in reading

IF YOU LOVE IT, DOWNLOAD IT.

https://erysdren.me/blog/2025-08-16/
2
8
1
repeated
repeated

Preparing a post about lafleur, the CPython JIT fuzzer I develop.

It has found 4 JIT crashes so far:
#136996: "JIT: `executor->vm_data.valid` assertion failure in `unlink_executor`".
#137007: "JIT: assertion failure in _PyObject_GC_UNTRACK".
#137728: "Assertion failure or `SystemError` in `_PyEval_EvalFrameDefault` in a JIT build".
#137762: "Assertion failure in `optimize_uops` in a JIT build".

Contributions welcome!

https://github.com/search?q=repo%3Apython%2Fcpython+lafleur&type=issues

0
1
1
That "EDR 0-day" post on reddit is quite entertaining!
1
0
0
repeated
Edited 3 days ago

Made a little pornographic test case for the UK , to see whether we can get Ofcom to ban AWS S3 from the United Kingdom.

http://ofcom.s3-website-us-east-1.amazonaws.com/

0
4
2
@codecolorist This hits hard after having spent many hours debugging shell escapes in cmdexec payloads... PowerShell is a harsh mistress, but it'd be even more gruesome if they had to do the same thing with cmd.exe :)
0
0
1
@albinowax Still the best one I could find for this task ;)
0
0
0
repeated
[RSS] tar-fs Link Directory Traversal Vulnerability

https://github.com/google/security-research/security/advisories/GHSA-xrg4-qp5w-2c3w

CVE-2025-48387
0
0
1
@raptor @slashdot Don't forget though that he can live this way of life in large part because of his accomplishments (that also came with substantial amount of money)
1
0
1
@mttaggart The stories title says that "[attacker] don't care about your endpoint security" which is simply not true (a lie, if you like). Stating (not suggesting) that EDR will not be effective not effective on other hosts when disabled on the pivot point is also a lie.

I absolutely agree with *your* comment, but this is just bad journalism transforming expert opinion into clickbait bullshit.
0
0
1
Show older