Posts
3347
Following
710
Followers
1577
"I'm interested in all kinds of astronomy."
repeated

RE: https://infosec.exchange/@albinowax/116018773839725691

I'm happy to be on the TOP 10 list for the second time, this time with the fun SOAP stuff.

I'm even more happy to see ORM research in 2nd place. I saw it live during BHEU and it was awesome 🤟

0
4
1
repeated

Cisco has discovered DKnife, an AitM toolkit installed on hacked routers and edge devices by Chinese hackers, designed to intercept and tamper with traffic to deliver malware

https://blog.talosintelligence.com/knife-cutting-the-edge/

0
3
0
repeated

The path to the PS VR2 (part 1) - "Recovery mode" <- yet another case study on how assumptions should always be checked in practice 🤷

https://bnuuy.solutions/2026/02/01/ps-vr2-recovery-mode.html

0
2
0
repeated
repeated

A good blog about computer viruses in Soviet times, the KGB and computer security in the USSR.

https://fromcyberia.substack.com/p/how-the-kgb-discovered-computer-viruses

0
1
0
repeated

🚨 New advisory was just published!

A flaw that exists within the handling of sch_cake can allow a local user under the CentOS 9 operating system to trigger an use-after-free. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. This vulnerability won first place in the Linux category during the TyphoonPWN 2025 event: https://ssd-disclosure.com/linux-kernel-net-sched-cake-qdisc-use-after-free-lpe/

0
2
0
repeated
Edited 4 days ago
I sat through way too many #pentest interviews where the candidates had no clue about the fundamentals of web security, like the Same-Origin Policy.

If you want to make a career of finding flaws in (web)apps, do yourself a favor and read @b0rk's HTTP zine:

https://wizardzines.com/comics/same-origin-policy/
0
6
7
repeated

While waiting for the upcoming release of 9.3 by @HexRaysSA, I have made some updates and bug fixes to my idalib-based headless IDA rhabdomancer, haruspex, and augur.

Check out the changelogs for all the details and enjoy!

https://hnsecurity.it/blog/streamlining-vulnerability-research-with-the-idalib-rust-bindings-for-ida-9-2/

0
4
1
repeated
repeated
TIL In #Proxmox when you *move* a disk, the original one doesn't get deleted but remains attached to the VM as "unused". Space gets only freed up in the original storage when you remove it from the VM.

#ProTip
1
0
1
It seems Windows can't even launch its terminal properly, this issue is open for >5 years:

https://github.com/microsoft/terminal/issues/4750
0
0
3
repeated

4 February 1917 | A Polish Jewish dancer Franciszka Mann was born. She was most probably the woman who on 23 October 1943, inside the undressing room of gas chamber II at Auschwitz II-Birkenau, seized SS man Josef Schillinger’s pistol, shot him & wounded SS man Wilhelm Emmerich.
---

A podcast about this and other cases of resistance at Auschwitz: https://www.auschwitz.org/en/education/e-learning/podcast/different-cases-of-organized-resistance-at-auschwitz/

0
4
0
repeated

Switching away from Hackerone is not a guarantee... Here we go.

3
4
0
repeated

Learning made me a better programmer.

Not because I write Rust at work. Because Rust forced me to think about things I'd been ignoring and I never realized this fact.

1
3
0
repeated

Also came across this today. Wasn't already in the ruleset, so I fixed that.

FreePBX Authenticated Command Injection - testconnection SSH functionality.

https://theyhack.me/CVE-2025-64328-FreePBX-Authenticated-Command-Injection/

0
3
0
[RSS] Micropatches released for Microsoft Excel Remote Code Execution Vulnerability (CVE-2025-62203)

https://blog.0patch.com/2026/02/micropatches-released-for-microsoft.html
0
0
2
repeated

Patch diffing + RCA for clfs.sys can take awhile.

I gave the diff + binary to a local LLM.

It mapped the UAF path, race condition, all IOCTLs in <20 min

LLMs don't replace the work, they are momentum.

New blog post following the UAF trail of CVE-2025-29824:

https://clearbluejar.github.io/posts/how-llms-feed-your-re-habit-following-the-uaf-trail-in-clfs/

2
2
1
repeated

Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers

Talk by Xingyu Jin and Martijn Bogaard about a new type of logical bugs in kernel driver mmap handlers exploitable via the ptrace functionality.

Authors found multiple Android vendor drivers affected by the issue. They also wrote an exploit for the IMG DXT GPU driver to escalate privileges on Pixel 10.

Video: https://www.youtube.com/watch?v=yAUJFrPjfCI
Slides: https://powerofcommunity.net/2025/slide/x-84592.pdf

0
3
0
Show older