Posts
3194
Following
706
Followers
1562
"I'm interested in all kinds of astronomy."
repeated

๐ŸŽ‰ KeePassXC 2.7.10 is out! ๐Ÿฅณ

The most prominent changes in this release are the addition of a Proton Pass importer and (due to popular request) a new setting for changing the application font size. You can find the full list of changes on our website:
https://keepassxc.org/blog/2025-03-04-2.7.10-released/

2
6
0
"You possessive apostrophe!" - sounds like a great insult!
0
1
2
repeated

๐—๐—ผ๐—ถ๐—ป ๐—ผ๐˜‚๐—ฟ ๐—น๐—ถ๐˜ƒ๐—ฒ ๐˜„๐—ฒ๐—ฏ๐—ถ๐—ป๐—ฎ๐—ฟ ๐—ผ๐—ป ๐— ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐Ÿฒ๐˜๐—ต!
Discover how to eliminate debugging inefficiencies and accelerate vulnerability research with time travel analysis.

Register now ๐Ÿ‘‡
https://www.linkedin.com/events/exploitingaroutervulnerabilityw7299810055170805761/

0
2
0
[RSS] Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit

https://icode4.coffee/?p=1081
0
1
1
[RSS] ENOMEM In Linux Kernel

https://u1f383.github.io/linux/2025/03/04/enomem-in-linux-kernel.html

"In this article, I will explore the feasibility of precisely managing memory usage within the Linux kernel" CVE-2023-2236
0
1
2
repeated

I wonder what the person who took that famous photo of the Doge Shiba Inu makes of all this now?

0
6
0
dae69e7cae50e60bb184359e5e4a3a91fb7045378fdd0be36a043e9634c5b952
0
0
4
repeated
repeated

Adapt to removal of Windows Arm32 .NET debugging

> .NET support for Windows on Arm32 has ended. Debugging support for this platform will be removed from Visual Studio 2022 starting with the 17.14 update.

https://learn.microsoft.com/en-us/visualstudio/debugger/adapt-to-removal-of-windows-arm32-dotnet-debugging?view=vs-2022

0
1
0
repeated

I'm excited to share CVE Crowd's Top 5 Vulnerabilities from February 25!

These five stood out among the 352 CVEs actively discussed across the Fediverse.

For each CVE, Iโ€™ve included a standout post from the community.

Enjoy exploring! ๐Ÿ‘‡

1
3
0
repeated

Listen, I'm not going to pretend that I'm even remotely surprised, but I will tell you that this is a slap in the face to every person in the infosec community that has worked to track and thwart Russian APTs for the last several decades.

https://www.theguardian.com/us-news/2025/feb/28/trump-russia-hacking-cyber-security

5
9
0
repeated

Happy to all who celebrate.

It took me a whole year to finally upload last year's jam...

https://music.axwax.eu/axwax-303-day-2024/

0
3
0
repeated

dmi ๐Ÿ’ฝ soon -> FOSDEM

Edited 10 months ago

today, i have IP-blocked the entirety of alibaba cloudโ€™s IPv4 range (47.80.0.0/13, 47.74.0.0/15, 47.76.0.0/14). And you could ask - domi, what the hell, thatโ€™s kinda sorta a lot of addresses?

fucking watch this: thatโ€™s sakamoto Mk5, my Ryzen 9 7950X3D server. Never before have I seen forgejo taking this much CPU.

Theyโ€™ve generated 9GB of access logs (!) and 230GB of generated tarballs (!!!) before I got to my laptop, investigated and ip-banned them. Iโ€™m positive that most forgejo deployments in existence wouldnโ€™t survive this.

If you needed another reason to fuck generative AI today - hereโ€™s one

3
9
0
repeated

bert hubert ๐Ÿ‡บ๐Ÿ‡ฆ๐Ÿ‡ช๐Ÿ‡บ๐Ÿ‡บ๐Ÿ‡ฆ

So I didn't know, but Europe already has a backup of PubMed, the database of biomedical research publications. The US PubMed broke down over the weekend. And here is our alternative: https://europepmc.org/

1
17
0
repeated

๐Ÿš€ New Blog & PoC Release: Abusing IDispatch for COM Object Access & PPL Injection ๐Ÿš€
I've developed a PoC exploit that demonstrates an interesting bug class in COM servers implementing IDispatch, allowing indirect object creation within the target process. Specifically, by leveraging the ability to instantiate STDFONTโ€”a legacy COM class not designed for cross-process useโ€”I was able to achieve code injection into a Windows PPL (Protected Process Light) process. This technique enables interaction with protected processes like LSASS.
This research builds on the work of @tiraniddo who identified how COM object manipulation via IDispatch can lead to unexpected process interactions. My PoC takes this concept further by demonstrating its practical impact through registry manipulation and .NET payload execution inside PPL processes.
๐Ÿ” Blog Post: https://mohamed-fakroud.gitbook.io/red-teamings-dojo/abusing-idispatch-for-trapped-com-object-access-and-injecting-into-ppl-processes
๐Ÿ’ป PoC & Source Code: https://github.com/T3nb3w/ComDotNetExploit
Key Highlights:
๐Ÿ”น Exploiting IDispatch in OOP COM servers
๐Ÿ”น Abusing STDFONT instantiation for process injection
๐Ÿ”น Achieving code execution inside PPL and accessing LSASS
๐Ÿ”น Bypassing SEC_IMAGE integrity checks
๐Ÿ”น Leveraging OnlyUseLatestCLR for compatibility

1
5
0
repeated

I keep hearing that Sup shouldn't exist because X exists.

I made Sup to replace Snapchat and Facebook Messenger in my own friend group

I think it might be useful to other friend groups or families too, being that you can join with an email or Pixelfed/Loops or Mastodon account

Not only that, but Sup will be modular, allowing for rich integration with pretty much any other chat platform (Signal, Matrix, Delta, etc)

It's like Beeper, but federated and open source. ๐Ÿš€

0
3
0
[RSS] A Series of io_uring pbuf Vulnerabilities

https://u1f383.github.io/linux/2025/03/02/a-series-of-io_uring-pbuf-vulnerabilities.html

CVE-2024-0582, CVE-2024-35880, ???
0
0
1
repeated

Hi! The slides for my talk today at RE//verse 2025 (@REverseConf), "Reconstructing Rust Types: A Practical Guide for Reverse Engineers", are now published: https://github.com/cxiao/reconstructing-rust-types-talk-re-verse-2025

It's been great to catch up with so many folks - if you're at the conference, come by and say hi!

The presentation was recorded, and the video will be published at a future date!

1
7
0
repeated

This is the most important comment I have heard this week โ€” Polandโ€™s Prime Minister Donald Tusk:

โ€œ500 million Europeans are asking 300 million Americans to defend them against 140 million Russians [โ€ฆ] Europe, if there is something we lack today, it is not economic or demographic power, but the belief that we are truly a global force.โ€

I think Tusk hits the bullseye here. Those 140 million Russians are already fully occupied by fighting Ukraine, and our leaders act like we are Liechtenstein.

31
15
0
repeated

If you are looking for my slides from my Reverse talk, you can find it and useful artifacts here: https://github.com/mahaloz/talks/tree/main/2025/REverse_SAILR

0
7
0
Show older