Posts
3370
Following
712
Followers
1579
"I'm interested in all kinds of astronomy."
[RSS] Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages

https://googleprojectzero.blogspot.com/2025/05/breaking-sound-barrier-part-i-fuzzing.html
0
0
2
repeated

"Wrong but plausible" is a feature and not a bug for LLMs if you're looking for a system to deploy where you can use it, say, to fine-tune insurance reimbursements to the exact dollar amount you wanted and have it produce the justifications needed to get there at an industrial scale

1
4
0
repeated

XWiki has been compromised, and all personal wikis have been deleted. That includes mine, named XHE for "XML Hacking Encycopledia" 😢

a baby is making a sad face wh...

0
3
0
repeated

Binary Ninja 5.0 brings big updates to the debugger: a cleaner adapter settings UI, smarter analysis that won’t slow down your session, and new backends including rr and Corellium. Faster and more flexible debugging, whether local or remote! https://binary.ninja/2025/04/23/5.0-gallifrey.html#debugger

0
3
0
repeated

German President Steinmeier's speech commemorating the 80th anniversary of the end of World War II:

https://www.bundespraesident.de/SharedDocs/Reden/EN/Frank-Walter-Steinmeier/Reden/2025/250508-End-WWII.html

You want to read the whole thing, but the part below and the emphasis on the importance of learning from the past instead of describing it as a "cult of guilt" were powerful and eloquent. No words were minced, and we need more of that.

0
5
0
repeated

Now this looks like a pretty kick ass project: FUZZUER: Enabling Fuzzing of
UEFI Interfaces on EDK-2 https://www.ndss-symposium.org/wp-content/uploads/2025-400-paper.pdf and source at https://github.com/BreakingBoot/FuzzUEr

0
2
0
repeated
Edited 9 months ago

Finally a paper on malware fuzzing! PFUZZER: Practical, Sound, and Effective Multi-path Analysis of
Environment-sensitive Malware with Coverage-guided Fuzzing https://www.diag.uniroma1.it/~delia/papers/eurosp25-pfuzzer.pdf

0
1
0
To join the recent series of great Windows Defender content (defendnot, EvilentCoerce) I published a status report on mpclient development:

Fuzzing Windows Defender with loadlibrary in 2025

https://scrapco.de/blog/fuzzing-windows-defender-with-loadlibrary-in-2025.html

#Fuzzing #ReverseEngineering #Antivirus
0
3
3
repeated

I think it’s really funny that in windows the standard libraries serve to abstract away incompatibilities between the kernel of different windows releases while this funny thing:

  • GLibc

in the lunix world does the exact opposite

0
3
1
repeated

A practical NTLM relay attack using the MS-EVEN RPC protocol and antivirus-assisted coercion https://github.com/Thunter-HackTeam/EvilentCoerce

0
2
0
repeated

FYI if you’re willing to link with ntdll or dynamically resolve it there’s a ton of APIs that return TEB/PEB or leave them in one of the registers.
(Don’t believe official return values. MSDN is a liar!)

https://bird.makeup/@vxunderground/1920208595808821334

2
1
0
repeated

Today 80 years ago Nazi Germany declared its unconditional surrender, ending the World War II.

0
2
0
How I ruined my vacation by reverse engineering [Windows Security Center]

https://blog.es3n1n.eu/posts/how-i-ruined-my-vacation/

Defender disabler tool:

https://github.com/es3n1n/defendnot
0
7
12
repeated

Recon training prices go up beginning of May! If Linux binary analysis and malware are down your alley, check out my 4-day training on the topic 🤓
https://recon.cx/2025/trainingLinuxMalwareReverseEngineering.html

0
4
0
[RSS] CVE-2024-11477- 7-Zip ZSTD Buffer Overflow Vulnerability - Crowdfense

https://www.crowdfense.com/cve-2024-11477-7zip-zstd-buffer-overflow
0
0
2
[RSS] exploits.club Weekly Newsletter 71 - Lots Of Linux, MacOS OOB Writes, Enterprise Pre-Auth RCEs, and More

https://blog.exploits.club/exploits-club-weekly-newsletter-71-lots-of-linux-macos-oob-writes-enterprise-pre-auth-rces-and-more/
0
0
4
repeated

Project Zero Bot

New Project Zero issue:

XNU VM_BEHAVIOR_ZERO_WIRED_PAGES behavior allows writing to read-only pages

https://project-zero.issues.chromium.org/issues/391518636

CVE-2025-24203
0
1
2
repeated

It makes me super uncomfortable that globbing in Bash can turn into code execution. The fact that the name of a file can change the behavior of ls is scary. This also works for other commands that you tend to glob with, such as rm.

17
9
0
repeated
repeated

with offensivecon around the corner, i figured id write another post on linux kernel exploitation techniques - this time i cover the world of page table exploitation! enjoy 🤓

https://sam4k.com/page-table-kernel-exploitation/

0
6
0
Show older