The Cryptax Award H2 2025 is out! (lol)
Best talks, papers, CTF challenges, tools I encountered in the second half of 2025:
https://cryptax.github.io/nomination-2025-h2/
It's a difficult selection, as always, and it is very personal opinion!
Congratulations to those who are listed, and kudos to others :)
THC Release 💥: The world’s largest IP<>Domain database: https://ip.thc.org
All forward and reverse IPs, all CNAMES and all subdomains of every domain. For free.
Updated monthly.
Try: curl https://ip.thc.org/1.1.1.1
Raw data: https://ip.thc.org/docs/bulk-data-access
(The fine work of messede 👌)
What does everyone think? Need feedback before release tomorrow :)
If you need to get your mood down a few notches, there are some new slop entries to torment yourself with here:
https://gist.github.com/bagder/07f7581f6e3d78ef37dfbfc81fd1d1cd
Training Ticket Shop for #offensivecon26 is now open.
The content of our 2026 trainings is unique and exclusive to OffensiveCon, so don’t miss out.
🔥 New this year: Get your training + conference ticket bundle - you have the opportunity to secure a conference ticket before the conference ticket shop opens!
You can also get a training ticket only...
Training tickets: https://www.offensivecon.org/register.html
And the conference ticket shop? Oh, it’ll open… sometime in the next 5 months. Stay tuned.👀
There's another researcher, Zhengyu Liu, who's been finding CPython crashes (mostly use-after-free) at breakneck speed (19 in 5 days!): https://github.com/python/cpython/issues?q=is%3Aissue%20author%3Ajackfromeast
Not sure about what technique they're using, but their site states they they favor "leveraging program analysis approaches to detect/exploit/patch vulnerabilities in real-world complex applications and systems".
Their reports are comprehensive, with great presentation and details.
There's a researcher, Jiang Yuancheng, who's doing a great work finding CPython crashes and memory leaks: https://github.com/python/cpython/issues?q=is%3Aissue%20author%3AYuanchengJiang
They've come up with a very clever idea for a new way of fuzzing, made a fine tool out of it, and are reaping great results.
Fuzzing can be a diminishing returns endeavor: you only have so many bugs to find. Their approach has shown itself to cover different areas and kinds of issues well, as shown by their track record.
High level diff of iOS 26.2 vs. iOS 26.3 beta1 🎉
https://github.com/blacktop/ipsw-diffs/blob/main/26_2_23C55__vs_26_3_23D5089e/README.md
CVE-2025-64669: Uncovering Local Privilege Escalation Vulnerability in Windows Admin Center https://cymulate.com/blog/cve-2025-64669-windows-admin-center/
Wrote down what I learned so far and open questions in this new doc: https://docs.google.com/document/d/16QNavHjds1OdkKsfqLYx6EF0ohA-Qh_dZc8OK9TFrQk/edit?tab=t.0#heading=h.z1r9lwho309s
…in case you are interested in seeing where I am and what are my next steps, and maybe have new ideas. Thanks in advance! The doc is free to comment, or you can always ping me here.
EDIT: Please do not tag/bother Tim Berners-Lee. Angle brackets happened many years before he started working on HTML.
Bellingcat’s Kolina Koltai uncovers the Hungarian national behind two deepfake porn websites. The key figure rakes in profits and vacations in luxury hotels in Dubai and Bali, whilst website visitors create sexually explicit images and videos.
Find out how we uncovered the administrator behind the deepfakes by reading the full investigation here: https://www.bellingcat.com/news/2025/12/15/mark-resan-reface-deepfake-porn/?utm_source=mastodon
For those of you who remember ScreamingGoat, they're currently looking for a new role. Ideally something in the threat Intelligence space and DC local. Y'all know how he is with emerging vulnerabilities. Let me know what you've got and I'll make sure it makes it to them.