Posts
3124
Following
708
Followers
1551
"I'm interested in all kinds of astronomy."
repeated

There's going to be more speak about AIs finding genuine security problems soon.

Google Big Sleep found one in that we reveal tomorrow.... in about eight hours. (but no, we don't know how much was AI and how much was human or how many false positives they had to wade through to get there etc maybe they will let us know later?)

0
1
0
repeated

Memory Integrity Enforcement is the culmination of a truly incredible amount of work :)

While there's so much to love, one of my favorite pieces was getting to bring kalloc_type-style isolation to out-of-bounds accesses on both the architectural and speculative path. This lets us both mitigate a variety of Spectre v1 style attacks and break the reliable exploitation of some of the most powerful first-order memory corruption primitives (arb offset OOB R/W).

https://security.apple.com/blog/memory-integrity-enforcement/

1
14
1
repeated

Every minute that your security team is spending on things that aren't a risk is a minute that they *aren't* spending on things that *are* a risk.

0
3
0
repeated

📢 Aaand here is Anton's talk about QEMU+RISC-V at KVM Forum 2025!

Automatic Frontend Generation for RISC-V Extensions

Video: https://www.youtube.com/watch?v=GPSKsZmu_S8&t=1297s (21:37)
Code: https://github.com/revng/udb-to-qemu/ 🦾

0
2
0
repeated

New blog post of me analyzing a crash dump with the bugcheck 0x9F. Root cause was a power IRP timeout in RAS SSTP during a device removal. The post walks PnP locks, the stuck IRP, and more, including my thought process. Check it out here: https://medium.com/@Debugger/power-irp-timeout-in-ras-sstp-causes-blue-screen-0x9f-during-sleep-e59cb76f291c

2
3
0
repeated

Windows 11 in esReverse. 💻 Full system emulation to boot, record, and rewind your analysis from kernel to userland.

Read the guide: https://eshard.com/posts/windows11-esreverse-emulation

0
3
0
repeated

@Blackhoodie_RE X @hexacon_fr happening again! This time it’s my turn to give back 🥹
Use the registration link below to sign up to 4 days of free training given by Sonia, @naehrdine and myself !

https://forms.gle/CwxFJFTGd6VdffJY7

1
3
0
repeated

That NodeJS supply chain hack incident is amazing because the threat actor(tm) got RCE access to like a billion devices and ran the world’s shittest Etherum dumper.

Imagine if they had done reverse shells instead, or automated lateral movement to ransomware deployment NotPetya style.

The thing that saved companies here was the threat actor was incompetent crypto boy, nothing more.

6
27
0
[RSS] FFmpeg - Heap-buffer-overflow write in jpeg2000dec

https://github.com/google/security-research/security/advisories/GHSA-39q3-f8jq-v6mg

CVE-2025-9951
0
0
1
repeated

All 54 lost clickwheel iPod games have now been preserved for posterity
Finding working copies of the last few titles was an "especially cursed" journey.
https://arstechnica.com/gaming/2025/09/all-54-lost-clickwheel-ipod-games-have-now-been-preserved-for-posterity/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

0
10
1
[RSS] unpacking Dell's iDRAC schtuff

https://trouble.org/?p=1383
0
0
2
repeated

Modern programming languages should have logos like this

4
17
2
repeated

2nd of to nights fixes. A 139 year old electrotherapy machine.

Three problems, a brush wasn't contacting the rotor (bent back into shape). The handles were suffering from corrosion (cleaned), and the horseshoe magnet had lost most of its power(see 2nd image).

Works well now... no wonder they were nervous :)

1
1
1
repeated
repeated
Edited 4 months ago

📣 IDA 9.2 is here!

➥ Smarter Go decompilation
➥ New Dynamic Xref Graph & Xref Tree
➥ Debugger & UI upgrades
➥ Expanded processor support (ARM, RISC-V)
➥ And more...

Explore the full release here: https://hex-rays.com/blog/ida-9.2-release

0
3
0
[RSS] Running code in a PAX Credit Card Payment Machine (part1) | Lets Hack It

https://lucasteske.dev/2025/09/running-code-in-pax-machines
0
1
3
[RSS] Windows Internals: Secure Calls - The Bridge Between NT and SK

https://connormcgarr.github.io/secure-calls-and-skbridge/
0
0
4
repeated
Edited 4 months ago

Imagine that the first-ever commercial transistor computer fell into your laps (figuratively!). What would you do with it? Is it even practical to use?

Now you can answer these and many other questions, because I made a thing~

"My first transistorised computer: A Crash Course" is a short user manual for the simulator and the autocode/assembler of a computer highly inspired and mostly compatible with Metrovick 950, the first-ever commercially available transistor computer from 1956.

https://git.sr.ht/~nkali/mv950toy/tree/main/item/docs/crash_course.md

7
7
0
repeated
Show older