Posts
2371
Following
534
Followers
1244
A drunken debugger

Heretek of Silent Signal
[RSS] Instead of putting a hash in the Portable Executable timestamp field, why not create a separate field for the hash?

https://devblogs.microsoft.com/oldnewthing/20240815-00/?p=110131
0
1
2
repeated

MSI motherboards susceptible to code execution & firmware implant - analysis of CVE-2024-36877 https://jjensn.com/at-home-in-your-firmware

0
1
0
repeated

Enjoy the old sch00l lulz:
Fuck You Ilfak - A IDA Pro 9.0 Beta 2 macOS x86 Fix Loader

https://github.com/gdbinit/fuckyouilfak

2
2
0
Nice to see this "I can't use 20% of all websites" level bug getting fixed after *checks notes* 6 years in Chromium:

https://issues.chromium.org/issues/41314367
1
2
7
repeated

Microsoft fixed CVE-2024-38213 last Tuesday. It was discovered in the wild by ZDI threat hunter @gothburz. Today, he makes the details of the vulnerability and how it's being used by threat actors. https://www.zerodayinitiative.com/blog/2024/8/14/cve-2024-38213-copy2pwn-exploit-evades-windows-web-protections

0
2
0
H/T to exploits.club for the previous BH posts, their newsletter is pretty cool!
1
0
3
repeated

Two days ago, NIST finalized three post-quantum cryptography standards. Today, we are announcing an open-source Rust implementation of one of these standards, SLH-DSA, now available in RustCrypto! https://blog.trailofbits.com/2024/08/15/we-wrote-the-code-and-the-code-won/

0
3
0
repeated

NEW: Every Pixel phone released since 2017 has a hidden Verizon app, "Showcase.apk," with deep system access that has an unpatched flaw. Google's response to the vulnerability caused Palantir to ditch Android altogether. @lhn has the scoop: https://www.wired.com/story/google-android-pixel-showcase-vulnerability/

3
2
0
repeated

the most recent hackerone issue was filed because the user googled "[another project] bug bounty program", clicked the first link (to 's bug-bounty) and entered an issue about a completely different project...

3
1
0
repeated

Long thread ahead about training a classifier of "good/batch matches" for .

So, the whole idea that I have been working on for quite some time already to try to, somehow, improve matching in Diaphora is the following: Train a model to better determine if a pair of functions in two binaries (ie, a match between a function A in binary X, and function B in binary Y) is correct or not.

1
1
0
repeated

Did someone already create a tarpit that targets the AI scraping bots?

0
1
0
Who volunteer to dress up as standing lamps for AlligatorCon?

#JeSuisLampshade
1
1
3
repeated

Just learned that in French cybersecurity threats are called "cybermenace" and I will only be using this term from now on

0
1
0
repeated

Mixing watering hole attacks with history leak via CSS https://adepts.of0x.cc/css-history-leaks/

0
1
0
repeated

I’m in shock

0
2
0
repeated
repeated

The folks from Xiaomi didn't pick up their Pwnie for Lamest Vendor Response, so we're keeping it safe for them until they decide to come accept it.

1
3
0
Show older