Posts
3906
Following
728
Followers
1600
"I'm interested in all kinds of astronomy."
repeated

🤔Ever wondered how your favorite tools work under the hood? During our work on SightHouse, we dug into BSIM, Ghidra's Binary function SIMilarity engine.

Many tools have been built around it, yet its internals remained undocumented. Until now 👇
https://blog.quarkslab.com/bsim-explained-once-and-for-all.html

0
4
0
repeated

I'm like 99% sure that strings is the best reverse engineering tool.

0
1
0
repeated

My kinda hot take on the Mythos stuff is really that there is so little money in offensive research that it's still not really that hard to find bugs. These AI companies are operating with budgets that make the entire offensive research of all big tech combined look like a joke

1
5
0
repeated

I remembered Joseph Kong today. His books basically guided me through the kernel and practically launched my career as a security researcher.

I started with FreeBSD around 2008–2010 while working as a sysadmin at a local ISP. Around that time, I began writing a FreeBSD rootkit just to understand how everything worked. In 2012, I wrote two kernel exploits for it. My first real kernel exploit targeted the sysret bug on Intel CPUs (the vulnerability discovered by Rafal Wojtczuk). After that, I wrote another exploit for a vulnerability in FreeBSD’s Linux compatibility layer.

I know FreeBSD gets a lot of criticism these days, but it’s still a great operating system. I believe in its philosophy and have a lot of respect for the competence of the people involved in the project.

1
2
0
repeated

"Days of arguing about exploitability can save minutes of fixing the bug."

-- Socrates, on vulnerability disclosure

0
6
0
repeated

An updated version of "Exploits of a Mom" by XKCD:

0
12
0
repeated

Hyperbridge exploited two weeks after April Fools' hack joke

April 13, 2026
https://www.web3isgoinggreat.com/?id=hyperbridge-exploit

0
9
0
repeated
repeated

Getting e-mail to work shouldn't be rocket science...

0
5
0
repeated

Micropatches released for Windows Shell Security Feature Bypass Vulnerability (CVE-2026-21510) https://blog.0patch.com/2026/04/micropatches-released-for-windows-shell.html

0
3
0
repeated

We chose a vulnerability in glibc (CVE-2025-4802) to teach students registered in our binary exploitation training the importance of the libc, loader, dynamic linker, and the kernel in making the execution of a modern Linux binary possible.

Furthermore, it demonstrates how a small oversight in the static glibc code allowed arbitrary libraries to be loaded into privileged code. Do you know the crucial role of the auxiliary vector? Or the main differences between dynamically and statically compiled binaries?

Check out the blog post for a brief analysis of CVE-2025-4802.

https://allelesecurity.com/libc-vuln-analysis/

0
6
0
repeated

When times were simpler:

"text generator"

1
2
0
repeated

joernchen :cute_dumpster_fire:

Edited 26 days ago

LLMs now do the busywork of finding amazing vulnerabilities for everyone willing to spend the tokens.

But hacking still isn't dead:

  1. We haven't at all solved the underlying problems which come with writing and shipping code.

  2. You still need to understand what you're looking at and what you are operating.

  3. The LLM platforms themselves are a exquisite target for hacking^Wcreative use of the technology.

Now when everyone can pull a CVE or two out of thin silicon and a few kWh of electricity the art of hacking might need adopt and maybe reshape a little but at its core the mind- and skillset will stay as relevant as it always was.

In that sense: keep hacking, keep exploring, break some stuff.

2
6
0
repeated
repeated
Edited 25 days ago

Blessed are the cheese makers

https://www.youtube.com/watch?v=NFPIGNua5WM

0
4
0
repeated

2 years ago I did a PoC to run 🦀 in the modem

Today it shipped in millions of devices!

They grow up to fast! 🥲

https://security.googleblog.com/2026/04/bringing-rust-to-pixel-baseband.html

0
4
1
[RSS] CVE-2025-8061: From User-land to Ring 0

https://sibouzitoun.tech/labs/cve-2025-8061/
0
0
2
repeated

If all you do in your tech career is:

1. When something is slow, you look carefully at the output of a profiler or a query plan & make measured suggestions about what to improve;

2. When something breaks badly, you gently but insistently ask what & why until you truly know, then the next time similar work is needed you bring up how to avoid doing what broke last time; and

3. When someone lacks info, you make them feel good for learning instead of bad for not knowing;

You will do good work.

3
13
0
repeated

😎 Zsolt Hegedűs, a likely candidate for Hungary’s health minister, really got the party going at the “Tisza” victory celebration 🇭🇺

0
4
0
"The compromise is resident, partly because the attack surface is older than most of the people hired to defend it."

https://cje.io/2026/04/08/offense-scales-with-compute-defense-scales-with-committees/
0
2
2
Show older