got a fun reply yesterday that was like "yeah I can't believe people are taking such a lax approach to verifying the behaviour of software especially if they use LLMs. we never would have done this when I worked at <well known arms manufacturer>"
Frida 17.8.0 dropped with frida-strace syscall tracing on Android & iOS, no jailbreak required 🙌 https://github.com/frida/frida/releases/tag/17.8.2
"Justice is what love looks like in public." Via Natalie Foster and Cornel West, commissioned by me through Clay Graham Art https://www.claygrahamart.com/products/robo-justice-battle-damage-variant-matte-poster
A very detailed tutorial from "Joaquin Pinillos"
Walk x86-64 page tables by hand in qemu and gdb. Decompose a virtual address, follow cr3 through all levels of physical memory, and extract a flag from raw bytes.
RegPwn was a Windows 0-day that we were using for LPE in our Red Team for a year (discovered by Filip D. In January 2025). Unfortunately it got fixed 🥲
Good bye RegPwn 🫡
An update to our bug bounty policy: https://attackanddefense.dev/2026/03/13/bug-bounty-program-updates-2026.html
RegPwn - Windows LPE vulnerability (now fixed) https://www.mdsec.co.uk/2026/03/rip-regpwn/