Posts
2716
Following
681
Followers
1506
"I'm interested in all kinds of astronomy."
@cryptax re-record the audio for the video you already have?
1
0
1
repeated

This October, the @internetarchive celebrates an extraordinary milestone: 1 trillion web pages preserved & available for access via the . We're celebrating in style.

Join us in person or online!
📆 Weds, Oct 22
📍 IN-PERSON: 5–10 PM PT (San Francisco)
💻 VIRTUAL: 7–8 PM PT | 10–11 PM ET

🎟️ Register ➡️ https://blog.archive.org/event/the-web-weve-built-celebrating-1-trillion-web-pages-archived/

0
4
0
repeated

Our CFP is open! If you’re working on something exciting, we want to hear from you! Submit your talk for RE//verse 2026: https://sessionize.com/reverse-2026

0
4
0
repeated

📢 2nd part of our Black Hat Arsenal talk is out!

Python scripting! 🐍🐍🐍

1
2
0
repeated

Since there are some pretty cool people around here, let me reshare this job offer here: We just published the first job posting for the team, I'm allowed to build at Security Research Labs.
I can honestly say, it's been a month full of awesome people, interesting, impactful work and lots of fun and new learnings. If you wanna explore that together and develop something great, feel free to hit me up. Also, if you have any questions, let me know! If you know someone, that would be a great fit for the team, the company and the topic, feel free to send them over :)

https://srlabs.de/careers#open-positions

0
5
0
[RSS] The Architectural Blind Spot We All Missed: A deep dive into the 25-year-old Intel opcodes that fool IDA, Ghidra, and Binary Ninja.

https://github.com/sapdragon/hint-break/blob/main/papers/en.pdf
0
0
2
[RSS] Becoming a Kernel Developer (3/3): You have patches upstream, great! How to contribute more!

https://www.linaro.org/blog/blog-3-you-have-patches-upstream-great-how-to-contribute-more/
0
0
0
repeated
repeated
[RSS] Lenovo DCC: Part 1 - A simple ACL Exploit

https://neodyme.io/en/blog/lenovo_dcc_lpe_logic/
0
0
1
repeated

In 2011, Aaron Swartz was arrested after he downloaded millions of academic journal articles from JSTOR via the MIT network. He was charged under federal laws (including wire fraud and violations of the Computer Fraud and Abuse Act) with up to 13 felony counts, carrying the possibility of decades in prison, large fines, and other penalties. These federal charges eventually lead to his death in 2013.

No AI company was ever charged under federal laws.
https://icy.wyvern.rip/notes/ad9ptt2s993v01j8

3
15
0
repeated

if you are doing any project that depends on r2, feel free to use this badge to specify the version of radare2 that is compatible or tested with:

[![radare2](https://img.shields.io/badge/radare2-6.0.4-green)](https://github.com/radareorg/radare2)

0
4
0
repeated

Seems Windows 11 25H2 is finally rolling out, and they're shipping the new Administrator Protection feature. Hopefully MS should have fixed 6 bypasses I found in it during insider preview :D

0
5
0
repeated
repeated

For the first time ever, @awscloud, @msftsecurity, @googlecloud and @wiz_io Research are joining forces to launch http://zeroday.cloud at @blackhatevents EU! 🤯

Find critical vulns in open-source cloud software & get paid from our $4.5M prize pool👇

https://zeroday.cloud

0
4
0
repeated

Kira: Spite. It gets shit done.

1
3
0
repeated
@th How is uncle Bob supposed to know that microsoft[.]com is legit?
0
0
0
repeated

We at emproof open-sourced a free firmware reverse engineering workshop for self-study.

Topics: ELF analysis, cracking, malware triage, embedded-Linux, bare-metal, crypto-key extraction, anti-analysis. Docker setup and solutions included.

https://github.com/emproof-com/workshop_firmware_reverse_engineering

0
5
0
Show older