Posts
2991
Following
698
Followers
1545
"I'm interested in all kinds of astronomy."
repeated

If you need to get your mood down a few notches, there are some new slop entries to torment yourself with here:

https://gist.github.com/bagder/07f7581f6e3d78ef37dfbfc81fd1d1cd

3
2
0
repeated

Training Ticket Shop for is now open.

The content of our 2026 trainings is unique and exclusive to OffensiveCon, so don’t miss out.

🔥 New this year: Get your training + conference ticket bundle - you have the opportunity to secure a conference ticket before the conference ticket shop opens!
You can also get a training ticket only...

Training tickets: https://www.offensivecon.org/register.html

And the conference ticket shop? Oh, it’ll open… sometime in the next 5 months. Stay tuned.👀

0
3
0
@0xabad1dea Isn't this an EU thing? I read about the same thing in Hungary maybe a week ago.
1
0
0
repeated

There's another researcher, Zhengyu Liu, who's been finding CPython crashes (mostly use-after-free) at breakneck speed (19 in 5 days!): https://github.com/python/cpython/issues?q=is%3Aissue%20author%3Ajackfromeast

Not sure about what technique they're using, but their site states they they favor "leveraging program analysis approaches to detect/exploit/patch vulnerabilities in real-world complex applications and systems".

Their reports are comprehensive, with great presentation and details.

https://jackfromeast.github.io/

0
1
0
repeated

There's a researcher, Jiang Yuancheng, who's doing a great work finding CPython crashes and memory leaks: https://github.com/python/cpython/issues?q=is%3Aissue%20author%3AYuanchengJiang

They've come up with a very clever idea for a new way of fuzzing, made a fine tool out of it, and are reaping great results.

Fuzzing can be a diminishing returns endeavor: you only have so many bugs to find. Their approach has shown itself to cover different areas and kinds of issues well, as shown by their track record.

3
3
0
repeated

link (t)wink: meme edition neocat_flag_pan

5
21
1
repeated
@greg @joern I'm under-educated for this one unfortunately :D
1
0
0
@joern Nah the previous was better on Akkoma
1
0
0
repeated

CVE-2025-64669: Uncovering Local Privilege Escalation Vulnerability in Windows Admin Center https://cymulate.com/blog/cve-2025-64669-windows-admin-center/

0
3
0
repeated

Wrote down what I learned so far and open questions in this new doc: https://docs.google.com/document/d/16QNavHjds1OdkKsfqLYx6EF0ohA-Qh_dZc8OK9TFrQk/edit?tab=t.0#heading=h.z1r9lwho309s

…in case you are interested in seeing where I am and what are my next steps, and maybe have new ideas. Thanks in advance! The doc is free to comment, or you can always ping me here.

EDIT: Please do not tag/bother Tim Berners-Lee. Angle brackets happened many years before he started working on HTML.

6
1
0
repeated

Bellingcat’s Kolina Koltai uncovers the Hungarian national behind two deepfake porn websites. The key figure rakes in profits and vacations in luxury hotels in Dubai and Bali, whilst website visitors create sexually explicit images and videos.
Find out how we uncovered the administrator behind the deepfakes by reading the full investigation here: https://www.bellingcat.com/news/2025/12/15/mark-resan-reface-deepfake-porn/?utm_source=mastodon

0
6
0
@WPalant Right, then Ghidra API sounds like a good choice indeed. Also note the Ghidra VersionTracker has several "atomic" matchers (like string matcher) which may also be useful, and _maybe_ they can be configured by creating a Ghidriff plugin?
0
0
1
@WPalant Not really grasping the situation but Pigaios by @joxeankoret may also be interesting?

https://github.com/joxeankoret/pigaios
1
0
0
@WPalant Why not Ghidriff/BinDiff/Diaphora?
1
0
1
repeated

For those of you who remember ScreamingGoat, they're currently looking for a new role. Ideally something in the threat Intelligence space and DC local. Y'all know how he is with emerging vulnerabilities. Let me know what you've got and I'll make sure it makes it to them.

0
9
0
repeated
Edited 9 days ago

just released liboprf-0.9.3

liboprf is a library implementing the OPRF from https://www.rfc-editor.org/rfc/rfc9497.html and in addition it also provides a threshold variant (tOPRF) and a distributed key generation (DKG) protocol for the tOPRF shared secret, as well as a key update protocol for the tOPRF shared secret. it comes with a high level python frontend that supports servers on TLS, USB and Bluetooth LE

see: https://github.com/stef/liboprf

0
1
0
repeated

We need to normalize declaring software as finished. Not everything needs continouos updates to function. In fact, a minority of software needs this. Most software works as it is written. The code does not run out of date. I want more projects that are actually just finished, without the need to be continuously mutated and complexified ad infinitum.

11
17
2
Show older