Posts
2362
Following
534
Followers
1244
A drunken debugger

Heretek of Silent Signal
repeated

The recording of our @WEareTROOPERS presentation is now online, enjoy!

- IBM i for Wintel Hackers

https://www.youtube.com/watch?v=t4fUvfzgUbY

0
1
0
repeated

Analysis of CVE-2024-37084: Spring Cloud Remote Code Execution https://blog.securelayer7.net/spring-cloud-skipper-vulnerability/

0
1
0
Off-by-One 2024 Day 1 - Keynote : Breaking Into Vulnerability Research: Dr Silvio Cesare

https://www.youtube.com/watch?v=tAmjkfO3-Ow
0
4
3
:O

"The TMS9900 is bonkers. Big endian, has no stack pointer, and there's an instruction to execute the contents of a register as if it were an instruction in memory." - @travisgoodspeed

"Mike Brent (tursilion) made an awesome TMS9900 code generator for CVBasic, so now it can target TI-99/4A computers. The picture shows Viboritas running in the Classic99 emulator." - @nanochess

https://github.com/nanochess/cvbasic
2
3
10
CVE-2023-41111: Samsung Baseband RLC Data Re-Assembly Buffer Overflow

https://labs.taszk.io/blog/post/93_rlc_bof/
0
0
3
repeated

Traceeshark: Deep Linux runtime visibility meets Wireshark https://github.com/aquasecurity/traceeshark

0
1
0
repeated

'The Dutch Data Protection Authority imposes a fine of 30.5 million euro and orders subject to a penalty for non-compliance up to more than 5 million euro on Clearview AI... Clearview has built an illegal database with billions of photos of faces, including of Dutch people. The Dutch DPA warns that using the services of Clearview is also prohibited.' https://www.autoriteitpersoonsgegevens.nl/en/current/dutch-dpa-imposes-a-fine-on-clearview-because-of-illegal-data-collection-for-facial-recognition

0
8
0
repeated
[RSS] The Co­Initialize­Security function demands an absolute security descriptor

https://devblogs.microsoft.com/oldnewthing/20240902-00/?p=110201
0
0
0
repeated

Zero Trust Environments

8
17
2
repeated
repeated

BlazeFox firefox pwnable reference solution for BlazeCTF:
https://gist.github.com/itsZN/4dd40ff12d886e5b3984200a92c1a38a

0
2
0
repeated

Here is my exploit for @plaidctf V8 exploit challenge. Bug was an n-day patched in chrome 66.0.3359.117
https://gist.github.com/itsZN/73cc299b9bcff1ed585e6206d1ade58e

0
2
0
repeated

Ah yes, I remember buying that textbook

9
9
0
repeated
repeated

Google Chrome security advisory: Stable Channel update for Desktop
4 security fixes, 2 externally reported by Cassidy Kim(@cassidy6564): CVE-2024-8362 (high) Use after free in WebAudio and CVE-2024-7970 (high) Out of bounds write in V8. No mention of exploitation.

0
2
0
Show older