Posts
2490
Following
577
Followers
1286
A drunken debugger

Heretek of Silent Signal
repeated

✧✦✶✷Catherine✷✶✦✧

are you a programmer? do you like heavy metal? would you like to be *really upset* by a music video?

do i have something for you.

https://www.youtube.com/watch?v=yup8gIXxWDU

26
15
0
repeated

Tell you a secret about red team work:

Almost everyone wants to pretend to be a red teamer; almost nobody had the willingness to put in the real work to become one.

Responsible Red Teaming is @thetaggartinstitute 's most enrolled course by a wide margin.

It is also the least-completed.

The course content is not more technical than any other offensive security course. Indeed, most of it is far less, instead requiring you to think about the human impact of the work. This course discusses how to operate in a safe, appropriate manner. It is not about popping shells.

Once most folks discover this, they bail.

If you want to do offensive security solely because you want to "hack stuff," you're a liability. You must understand your role in hardening defenses and working with defenders to improve operational security.

The job is not a CTF. If you can't hack that, please find another line of work.

6
5
0
repeated
repeated

As a service to security researcher, I added this section to 's hackerone page:

AI

If you have used AI in the creation of the vulnerability report, you must disclose this fact in the report and you should do so clearly. We will of course doubt all "facts" and claims in reports where an AI has been involved. You should check and double-check all facts and claims any AI told you before you pass on such reports to us. You are normally much better off avoiding AI.

https://hackerone.com/curl

2
4
0
repeated

Inspirational Skeletor💀

3
7
0
MmScrubMemory
The Nemesis of Virtual Machine Introspection

https://wbenny.github.io/2024/11/21/mmscrubmemory.html?ref=blog.exploits.club
0
0
2
repeated

Pointers Are Complicated, or: What's in a Byte?
https://www.ralfj.de/blog/2018/07/24/pointers-and-bytes.html

Pointers Are Complicated II, or: We need better language specs
https://www.ralfj.de/blog/2020/12/14/provenance.html

Pointers Are Complicated III, or: Pointer-integer casts exposed
https://www.ralfj.de/blog/2022/04/11/provenance-exposed.html

0
2
0
repeated

Why are some people obsessed about reading the right way?

“You’re wasting your time if you’re not reading the classics” or “reading should be about sucking the marrow of the vast body literature” or “reading is about retaining information”

None of it is true. People read because they like reading. Maybe they like stories. Maybe they like words. Maybe they are learning something obscure. There are millions of different reasons or ways to read. Don’t let pedants steal your joy or soul.

Just read

7
12
0
[RSS] Everyday Ghidra: Symbols -- Prescription Lenses for Reverse Engineers -- Part 1

https://clearbluejar.github.io/posts/everyday-ghidra-symbols-prescription-lenses-for-reverse-engineers-part-1/
0
0
0
[RSS] Reverse engineering the Sega Channel game image file format

https://www.infochunk.com/schannel/index.html
0
0
1
repeated

Malimite is an iOS decompiler designed to help researchers analyze and decode IPA files https://github.com/LaurieWired/Malimite

0
4
0
repeated

Intel launched the Pentium processor in 1993. Unfortunately, dividing sometimes gave a slightly wrong answer, the famous FDIV bug. Replacing the faulty chips cost Intel $475 million. I reverse-engineered the circuitry and can explain the bug. 1/9

5
26
1
Writing down (and searching through) every UUID · eieio.games
https://eieio.games/blog/writing-down-every-uuid/

/via @filippo

#frombsky
0
5
2
repeated

here's a useful shell git alias for this time of year
`alias gitmcclane='git commit -m "yippee-ki-yea, motherfucker" && git push --force’`

0
1
0
repeated

Command injection is common enough, but truncating the SHA256 hash to 12 characters? That's new to me. https://github.com/openwrt/asu/security/advisories/GHSA-r3gq-96h6-3v7q

1
5
1
repeated

Breaking the most popular Application Firewalls () in the market

https://nzt-48.org/breaking-the-most-popular-wafs

0
2
0
[RSS] Trying to Exploit My Old Android Device, take 2 (CVE-2020-0401, PackageManagerService)

https://pwner.gg/blog/Android%27s-CVE-2020-0401
0
1
2
"Good Red Team comes on slow. The first month is all waiting, then halfway through the second month you start cursing the service provider who burned you, because nothing is happening. And then... ZANG!" - Hunter CISO Thompson
0
3
8
Show older