Posts
2471
Following
660
Followers
1482
"I'm interested in all kinds of astronomy."
That "EDR 0-day" post on reddit is quite entertaining!
0
0
0
repeated
Edited 24 days ago

Made a little pornographic test case for the UK , to see whether we can get Ofcom to ban AWS S3 from the United Kingdom.

http://ofcom.s3-website-us-east-1.amazonaws.com/

0
5
2
repeated
[RSS] tar-fs Link Directory Traversal Vulnerability

https://github.com/google/security-research/security/advisories/GHSA-xrg4-qp5w-2c3w

CVE-2025-48387
0
0
1
Hi, I'm your favorite security vendor, welcome to...
0
9
22
"printer on fire" thread by @lauriewired unrolled from the other site:

https://threadreaderapp.com/thread/1956498902443827574.html
1
2
2
repeated

lp0 is a Linux error code that means “printer on fire.”

It’s not a joke. In the 50s, computerized printing was an experimental field.

At LLNL (yes, the nuclear testing site), cathode ray tubes created a xerographic printer.

...it would occasionally catch fire.

2
1
0
Fun fact: the #Ghidra API is quite consistent in naming methods according to the data types they accept/return, but HighVariables are returned from Varnodes via getHigh()
0
0
1
repeated

hashcat v7.1.0 released!

This update includes important bug fixes, new features, and support for new hash-modes, including KeePass with Argon2.

Read the full write-up here: https://hashcat.net/forum/thread-13353.html

0
6
0
repeated

A sad day indeed - the original Rick Roll video has finally been taken down from YouTube from a copyright claim.
https://www.youtube.com/watch?v=dQw4w9WgXcQ

8
11
0
On a related note: is there a window manager/theme/config/??? that is optimized for #eInk screens?

I guess high a contrast theme, minimal animation/tiling would be essential, but I expect many little problems to solve along the way.

#Linux #OSS
1
0
0
Can't read LED screens on the beach so I spent some time hacking on @albinowax's old Perl script and made single-file e-books of all Phrack issues, ICYMI:

https://scrapco.de/dataslate/phrack/

(Will probably update when 72 comes out)
2
8
9
repeated
repeated

I wish watchTwr Labs was on mastodon, their blog posts are always amazing.
Today's about a Fortinet vulnerability:
https://labs.watchtowr.com/should-security-solutions-be-secure-maybe-were-all-wrong-fortinet-fortisiem-pre-auth-command-injection-cve-2025-25256/

1
6
0
repeated

squirrels always act and look like its their first day being a squirrel

4
8
1
repeated

finally got around to writing up my windows exploit from pwn2own vancouver 2024! (plus some notes about using it on xbox) https://exploits.forsale/pwn2own-2024/

0
8
0
repeated

Following the method demonstrated by @yarden_shafir in "Your Mitigations Are My Opportunities", this implementation automates adding a driver to the HvciDisallowedImages registry entry, ensuring it will be blocked from loading after the next reboot.

https://github.com/unkvolism/Solemn

0
2
0
repeated

Yo all, it is Friday now where I am, so might as well get the thing going.

Today's guest is the famous NES PPU chip, RP2C07A by Ricoh. What's interesting about this particular sample is that it's very very dead. Many thanks to @root42 for supplying it!

As always, a short thread follows. Why not give this one a boost while you're here? :D

SiPron page for those hi-res maps we all love: https://siliconpr0n.org/archive/doku.php?id=infosecdj:ricoh:rp2c07a

Note the die is oriented the same way Visual 2C02 has it: https://www.nesdev.org/wiki/Visual_2C02

2
6
0
repeated
Show older