Posts
3368
Following
712
Followers
1579
"I'm interested in all kinds of astronomy."
Fine, I made my own Markdown to HTML document generator (with Blackjack and hookers):

https://github.com/v-p-b/sugardocy

It takes a single MD file, and outputs a single, self-contained HTML file without downloading the kitchen sink.

Contributions are welcome, esp. if you have better taste and frontend skills than I do.
0
3
6
@chungyc @alios @troed That's what I'm trying to do rn, and I will probably get there at some point, but what I'm looking for is a complete solution.
0
0
0
[RSS] Micropatches Released for Microsoft Management Console Security Feature Bypass Vulnerability (CVE-2025-26633)

https://blog.0patch.com/2025/05/micropatches-released-for-microsoft.html
0
0
2
I need a tool that can generate self-contained HTML pages from #Markdown with different styles.

markdown-styles looks really close, but I wonder if there are alternatives (preferably not requiring NodeJS):

https://github.com/mixu/markdown-styles
4
0
0
repeated

The V Programming Language

V now supports 3 more architectures:

- loongarch64
- riscv32
- s390x (IBM Z)

0
3
0
repeated
Edited 8 months ago

I always find it a bit surprising that "looking up executables in PATH" isn't implemented in one central place (there are at least 3 implementations that I use regularly: in libc, my shell, in Go, and probably more that I don't know about)

it's a weird thing because there are actually many different implementations, but I think in general the implementations act similarly enough that you can pretend there's only 1 implementation, I've never actually run into a problem caused by this

6
2
1
repeated
repeated

Check it out. I just published TeleMessage Explorer: a new open source research tool https://micahflee.com/telemessage-explorer-a-new-open-source-research-tool/

1
8
0
repeated

"Much of the essence of building a program is in fact the debugging of the specification." — Fred Brooks

1
4
0
repeated

Hey fedi, if someone knows how to correctly define parallelized instructions in Ghidra's SLEIGH, well, I'm more than interested !

Or if you are aware of any decent documentation on how to define parallelized instructions in SLEIGH and want to share some pointers, that would be awesome too 😊

1
3
0
repeated

Types of codebases my customers send me:

- Enterprise javabean factory factory... on a SIM card

- C# programmer retasked to write an authenticated bootloader in C for an arm platform with no training

- Beautiful well-written, easy-to-read C by an experienced systems programmer, with one mind-blowing 100-out-of-100-risk-severity bug buried in miscutils.c

- There is a hermit monk in a cave in Czechia. Once every three years, he emerges with a new revision of the codebase. It is horrifying spaghetti logic that repulses the human soul, but no matter how long and how hard you look, you can't actually find anything wrong with it

8
17
0
repeated

Germany’s largest telecommunication provider Deutsche Telekom is owned by Chinese hackers. And its managed IT service subsidiaries are too. No media reporting on it yet. Deutsche Telekom (addicted to cheap Huawei equipment) chose not to go public. Wake up! https://blog.eclecticiq.com/china-nexus-threat-actor-actively-exploiting-ivanti-endpoint-manager-mobile-cve-2025-4428-vulnerability

2
2
0
repeated
repeated
repeated
Edited 8 months ago

Interesting story about Google publishing someone's phone number on searches for them when they gave the number to Google for account verification/security:

https://danq.me/2025/05/21/google-shared-my-phone-number/

Reminds me of the time a company I worked for (AFAIK) accidentally used phone numbers obtained the same way for ad targeting and got fined $150M

0
6
0
[RSS] DBus and Polkit Introduction

https://u1f383.github.io/linux/2025/05/25/dbus-and-polkit-introduction.html

With analysis of CVE-2025-23222 and CVE-2021-3560
1
4
5
[RSS] CVE-2025-32756: Low-Rise Jeans are Back and so are Buffer Overflows [Fortinet]

https://horizon3.ai/attack-research/attack-blogs/cve-2025-32756-low-rise-jeans-are-back-and-so-are-buffer-overflows/
0
2
6
repeated

Graham Sutherland / Polynomial

Mateusz Jurczyk from GP0 has been been writing a blog series on the implementation details of the Windows Registry, and there's a truly monumental amount of work on show here.

this one post alone is 24,000 words long, and covers a huge range of security issues discovered across the registry attack surface.

practically mandatory reading if you're doing Windows appsec assessments. really incredible stuff.

https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-7-attack-surface.html

0
5
0
repeated

Sad times, John Young of Cryptome is no longer with us:

https://www.theregister.com/2025/05/24/john_young_obituary/

0
2
0
Show older