INTERVIEW of "MB" WhereWarlocksStayUpLate:
https://wherewarlocksstayuplate.com/interview/mohammed-bagha/
You have inspired many. We are fans:⚡️🌊🎠
https://wherewarlocksstayuplate.com/interview/mohammed-bagha/
Learn Turbo Pascal - a video series originally released on VHS
The IBM System/360 machine instructions reference card #s360 #assembly #mainframe https://archive.computerhistory.org/resources/access/text/2010/05/102678081-05-01-acc.pdf
Yes we are all normal here in HUMANSVILLE. We are all HUMANS of course. No need to check.
The Debugging Book
Interactive guide exploring automated debugging, testing, and program repair with Python examples for researchers and developers.
Fun times with Telerik UI and DoS by default (it will hit for a long time I think). Sometimes it may lead to more fun, like RCE :)
Gadgeting inspired by @pwntester Oleksandr and @stevenseeley
Blog:
Dear Infosec people who have looked at XML and XXE before: I am trying to get an understanding of Blind XXE.
Many of the descriptions I find are lacking an important detail which makes the attack much less practical. Blind XXE works by building an URL which contains content of a file, allowing to exfiltrate content. However, in all my tests, that *only* works if the file contains no newlines, as those are not allowed in URLs. Am I missing something?
🧵
That means the attack is only relevant if a) you have a file with a secret, but no newlines&other characters breaking an URL, b) you know the path.
That seems rather unlikely in practice.
It may be that there are implementations that will ignore that and still open the URL. Or that will auto-encode newlines. Or that there's some trick I don't know. But that's all speculation. If you know of any *working* scenario where exfiltration with newlines works, I'd be interested to hear about it.
DOMPurify 3.3.0 will soon be released, with this likely being the most important change in a long time:
2025 Component Abuse Challenge: Load Cell Anemometer
https://hackaday.com/2025/10/09/2025-component-abuse-challenge-load-cell-anemometer/
Finding a buggy driver is one thing, abusing it is another🧠
In his latest blog post, Luis Casvella shows you how BYOVD can be used as a Reflective Rootkit Loader ! 🚀
➡️ https://blog.quarkslab.com/exploiting-lenovo-driver-cve-2025-8061_part2.html
A few technical examples of when C++/Rust interop is complicated. #EuroRust