Posts
2527
Following
646
Followers
1461
"I'm interested in all kinds of astronomy."
repeated

As a service to security researcher, I added this section to 's hackerone page:

AI

If you have used AI in the creation of the vulnerability report, you must disclose this fact in the report and you should do so clearly. We will of course doubt all "facts" and claims in reports where an AI has been involved. You should check and double-check all facts and claims any AI told you before you pass on such reports to us. You are normally much better off avoiding AI.

https://hackerone.com/curl

2
3
0
repeated

Inspirational Skeletorđź’€

3
6
0
MmScrubMemory
The Nemesis of Virtual Machine Introspection

https://wbenny.github.io/2024/11/21/mmscrubmemory.html?ref=blog.exploits.club
0
0
2
repeated

Pointers Are Complicated, or: What's in a Byte?
https://www.ralfj.de/blog/2018/07/24/pointers-and-bytes.html

Pointers Are Complicated II, or: We need better language specs
https://www.ralfj.de/blog/2020/12/14/provenance.html

Pointers Are Complicated III, or: Pointer-integer casts exposed
https://www.ralfj.de/blog/2022/04/11/provenance-exposed.html

0
2
0
repeated

Why are some people obsessed about reading the right way?

“You’re wasting your time if you’re not reading the classics” or “reading should be about sucking the marrow of the vast body literature” or “reading is about retaining information”

None of it is true. People read because they like reading. Maybe they like stories. Maybe they like words. Maybe they are learning something obscure. There are millions of different reasons or ways to read. Don’t let pedants steal your joy or soul.

Just read

7
10
0
[RSS] Everyday Ghidra: Symbols -- Prescription Lenses for Reverse Engineers -- Part 1

https://clearbluejar.github.io/posts/everyday-ghidra-symbols-prescription-lenses-for-reverse-engineers-part-1/
0
0
0
[RSS] Reverse engineering the Sega Channel game image file format

https://www.infochunk.com/schannel/index.html
0
0
1
repeated

Malimite is an iOS decompiler designed to help researchers analyze and decode IPA files https://github.com/LaurieWired/Malimite

0
4
0
repeated

Intel launched the Pentium processor in 1993. Unfortunately, dividing sometimes gave a slightly wrong answer, the famous FDIV bug. Replacing the faulty chips cost Intel $475 million. I reverse-engineered the circuitry and can explain the bug. 1/9

5
23
1
Writing down (and searching through) every UUID · eieio.games
https://eieio.games/blog/writing-down-every-uuid/

/via @filippo

#frombsky
0
4
2
repeated

Breaking the most popular Application Firewalls () in the market

https://nzt-48.org/breaking-the-most-popular-wafs

0
2
0
[RSS] Trying to Exploit My Old Android Device, take 2 (CVE-2020-0401, PackageManagerService)

https://pwner.gg/blog/Android%27s-CVE-2020-0401
0
1
2
"Good Red Team comes on slow. The first month is all waiting, then halfway through the second month you start cursing the service provider who burned you, because nothing is happening. And then... ZANG!" - Hunter CISO Thompson
0
2
7
repeated

I'll just leave this here for the real programmers.

3
4
0
repeated

Forward thinking was just the thing that made Multics what it is today.

— Erik Quanstrom

0
3
0
repeated

Santa brought new a blog post!

Handling Arbitrarily Nested Structures with

https://blog.silentsignal.eu/2024/12/06/custom-decoder-for-burp/

0
2
0
repeated

The competition compromises your C2 infrastructure and operator workstations.

"a longstanding campaign orchestrated by the Russian-based threat actor known as 'Secret Blizzard' (also referred to as Turla). This group has successfully infiltrated 33 separate command-and-control (C2) nodes used by Pakistani-based actor, 'Storm-0156.'"

https://blog.lumen.com/snowblind-the-invisible-hand-of-secret-blizzard/

0
2
0
[RSS] URL File NTLM Hash Disclosure Vulnerability (0day) - and Free Micropatches for it

https://blog.0patch.com/2024/12/url-file-ntlm-hash-disclosure.html
0
0
0
Show older