Posts
2358
Following
513
Followers
1232
A drunken debugger

Heretek of Silent Signal
[RSS] An Introduction to Chrome Exploitation - Maglev Edition

https://www.matteomalvica.com/blog/2024/06/05/intro-v8-exploitation-maglev/
0
2
4
[RSS] Frida 16.3 is out with CoreDevice/RemoteXPC support, new Service API, and many other improvements

https://frida.re/news/2024/05/31/frida-16-3-0-released/
0
1
1
repeated

Anyone have security contacts at Google? One of their IP addresses is spamming my ssh server, apparently as part of a botnet. Seems someone got compromised.

34.71.138.230 is the guilty party.

2
2
0
repeated

I added disabling Recall to my HardeningKitty list:
https://github.com/0x6d69636b/windows_hardening

Disable Recall - User
[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\WindowsAI]
"DisableAIDataAnalysis"=dword:00000001

Disable Recall - Machine (not yet official)
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsAI]
"DisableAIDataAnalysis"=dword:00000001

1
2
0
repeated

Introducing Honeykrisp: the world's first conformant Vulkan® 1.3 driver for Apple Silicon.

https://rosenzweig.io/blog/vk13-on-the-m1-in-1-month.html

1
8
0
repeated
repeated

It happened again. We accidentally broke another check-in . This time Mr O'Yolo triggered a problem, crashed the Allegro Scenario Player and escaped the mode, which enabled access to the Windows Desktop: https://www.pentagrid.ch/en/blog/ariane-allegro-hotel-check-in-terminal-kios-escape/

0
2
0
repeated

@recon is hosting BlackHoodie again this year, with a training on Reverse Engineering Ransomware brought to you by the incomparable Suweera DeSouza and Alex Delamotte. Registration is still open https://blackhoodie.re/Recon2024/ please share!

0
4
0
repeated

🎉 Go 1.22.4 and 1.21.11 are released!

🔒 Security: Includes security fixes for archive/zip and net/netip

🔈 Announcement: https://groups.google.com/g/golang-announce/c/XbxouI9gY7k

⬇️ Download: https://go.dev/dl/#go1.22.4

0
3
0
repeated
repeated
the only thing worse than "WHY IS THIS BROKEN" is "WHY DOES THIS WORK"
1
4
0
today's demo effect is brought to you by...
0
1
4
repeated

Adobe introduces the One Click Stalin tool.

1
6
1
repeated

Ever wanted to feed the decompiled C code into source code analysis tools?
With rev.ng you can! 💪

We emits syntactically valid C code!

Here's a PoC did with Clang Static Analyzer. 😎

0
2
1
Break out the POWER 10
And the drum machine!
0
1
4
repeated
repeated
repeated

How does F5's Secure Vault, its "super-secure SSL-encrypted storage system" work? Response in this article by team member @myst404

https://offsec.almond.consulting/deep-diving-f5-secure-vault.html

0
2
0
repeated

🚨 New advisory was just published! 🚨

A vulnerability in the Linux kernel allows local attackers to escalate privileges on affected installations of Linux Kernel:
https://ssd-disclosure.com/ssd-advisory-linux-kernel-nft_validate_register_store-integer-overflow-privilege-escalation/

0
1
0
Show older