Posts
3377
Following
712
Followers
1579
"I'm interested in all kinds of astronomy."
repeated

Debugging in the terminal isn't difficult anymore 🔥

🛠️ Meet **heretek** — A gdb TUI dashboard

🐛 Supports viewing stack, registers, instructions, hexdump & more!

🚀 Works with remote targets seamlessly (no gdbserver!)

🦀 Written in Rust & built with @ratatui_rs

⭐ GitHub: https://github.com/wcampbell0x2a/heretek

2
5
0
repeated
repeated
repeated

🚀 v6.0 is here! Full Kotlin rewrite w/ improved performance & responsiveness!
🆕 Built-in GraphiQL & Voyager visualization regardless of the target
🆕Circular references detector
🆕Improved batch queries screen
🚀 SPEED!

https://github.com/doyensec/inql/releases/tag/v6.0.0

0
4
0
repeated

LLMs: astrology, for men

0
3
1
repeated

New release 7.6 is announced! This will be updated as I find more information.

https://www.rpgpgm.com/2025/04/version-76-announced.html

0
1
0
repeated

A deep dive into modern Windows Structured Exception Handler (SEH) [Nov. 2024.]

https://blog.elmo.sg/posts/structured-exception-handler-x64/

0
0
2

Fun fact: you can attach to the gdbserver exposed by #rr and do #TimeTravelDebugging from #Ghidra :)

UX is similar to ret-sync.

1
2
6
repeated
Edited 10 months ago

, 8 Apr 1959, Mary K Hawes initiates a project to create the first universal programming language for computers used by businesses and government. Grace Hopper led the team that then created COBOL. Some mainframes are still using it.

1
9
0
repeated

Spring has sprung. Birds are singing, flower buds are budding and the website is open for business. Bookmark https://defcon.org/html/defcon-33/dc-33-index.html for all the latest info on everything . August will be here before you know it and you’ll want to be in the loop as things develop.

Stay in touch, and we’ll see you at .

1
3
0
repeated

Apparently Bugcrowd was not pwned, they just try to roll out mandatory MFA:

https://www.bugcrowd.com/blog/bugcrowd-security-update-password-reset-and-mfa-requirement/

Scientists still struggle to come up with a way how this information could be included in the password reset mails they sent out, we’ll keep you updated about any breakthroughs!

h/t @raptor

0
2
2
[RSS] 'ToddyCat' Hackers Exploit ESET Antivirus Flaw to Bypass Windows Security

https://cyberinsider.com/toddycat-hackers-exploit-eset-antivirus-flaw-to-bypass-windows-security/

Spoiler: version.dll strikes again...
0
0
0
repeated
Edited 10 months ago

Interesting talk on designing low-bit floating point number systems. Imagine you have 6-bits, using IEEE754 would you want to waste 6 of your codes for different NaNs? Do you really need two zeros? How about adding ±∞ or does saturating to ±FLT_MAX work for you use case? You can upconvert to Binary32 or Binary64 to do math operations, but which one gives you the better conversion when re-packing back down to 6-bits?

IEEE working group P3109 has the goods.

https://www.ac.uma.es/arith2024/slides/keynote1.pdf

0
1
1

So Bugcrowd got pwned or what?

2
0
1
repeated
OH: it's a nice conditional jump you have here. it would be a shame if something happened to it
3
7
0
repeated

Here is another challenge. While I know what the device does, I was not able to identify much of the components on the circuit board. Quite sure I could not solve this challenge myself.

So far I have not been able to identify
* the microcontroller
* the silver can on the top right
* any datecode

As always, please write down your deductions and guesses behind a CW to not spoil it for others.

7
4
0
repeated

At @recon , @nicolodev and I discuss the current state of MBA (de)obfuscation and their applications. We’ll also introduce a new plugin for simplifying MBAs in the decompiler.

Details: https://cfp.recon.cx/recon-2025/featured/

I'll also give a training: https://recon.cx/2025/trainingSoftwareDeobfuscationTechniques.html

0
3
1
Show older