Advertisement · 728 × 90

Posts by

Understanding Docker Internals: Building a Container Runtime in Python | Muhammad Breaking down container technology by building a simple container runtime from scratch using Python and Linux primitives like namespaces and cgroups

Understanding Docker Internals: Building a minimal Container Runtime with Python on Linux using Namespaces, Control Groups and Filesystem Isolation #Docker #Linux muhammadraza.me/2024/buildin...

5 months ago 14 7 0 1

[RSS] unpacking Dell's iDRAC schtuff


trouble.org ->


Original->

7 months ago 2 1 0 0
GitHub - blacktop/go-hypervisor: Apple Hypervisor.framework bindings for Golang Apple Hypervisor.framework bindings for Golang. Contribute to blacktop/go-hypervisor development by creating an account on GitHub.

Created Go bindings for Apple's Hypervisor.framework.

Why? Because I wanted to test a Pure Go emulator I'm writing against and couldn't get unicorn2 to work on macOS 26. Plus what's going to be faster than Apple's OWN hypervisor 😎

Check it out! 🎉

github.com/blacktop/go-...

7 months ago 6 4 0 0
Post image Post image Post image Post image

E voi, che cane avete? (continua⬇️ )
#canotipi #cani #cane #cana

1 year ago 48 8 6 1
Preview
Tutorial: unpacking executables with TinyTracer + PE-sieve In this short blog I would like to demonstrate you how to unpack an executable with PE-sieve and Tiny Tracer. As an example, let’s use the executable that was packed with a modified UPX: 8f66…

A small demo/tutorial on unpacking executables with #PEsieve and #TinyTracer: hshrzd.wordpress.com/2025/03/22/u...
- automatic OEP finding, reconstructing IAT, avoiding antidebugs and fixing imports broken by shims

1 year ago 28 13 0 0
Preview
The ESP32 "backdoor" that wasn't | Dark Mentor LLC 4 day class covering the full Bluetooth Low Energy (BLE) protocol stack from the bottom (PHY) up to the top (GATT). The core of the class is built around playing with a game application on an Android phone, talking via Bluetooth to an IoT-type piece of hardware, and analyzing the communication between them. The 4th day is focused on assessing a cutomized Ultra-Vulnerable Peripheral firmware, running on Zephyr RTOS, which has had vulnerabilities introduced into it which are representative of vulnerabilities found in the past across many other platforms.

I’ve posted a detailed explanation of why the claimed ESP32 Bluetooth chip “backdoor” is not a backdoor. It’s just a poor security practice, which is found in other Bluetooth chips by vendors like Broadcom, Cypress, and Texas Instruments too. https://darkmentor.com/blog/esp32_non-backdoor/

1 year ago 57 34 7 3
Preview
On Apple Exclaves Enhancing kernel isolation, one step at a time.

Great article about Apple's 🍎 Exclaves & Conclaves that provides a high-level overview and then dives into technical details implemented in XNU 👀

randomaugustine.medium.com/on-apple-exc...

1 year ago 11 2 0 0
Advertisement

THIS IS HUGE! Researchers at Stanford University have developed a dual-antibody treatment that remains effective against ALL SARS-CoV-2 variants by targeting a less-mutable part of the virus. This breakthrough could lead to longer-lasting therapies that OUTPACE viral evolution. 🧪🧵⬇️

1 year ago 29571 7781 576 712
Preview
Undocumented commands found in Bluetooth chip used by a billion devices The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains undocumented commands that could be leveraged for attacks.

Tarlogic found a "backdoor" im the ESP32 chips:
bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices

Broadcom & Cypress chips have the same HCI "backdoor" allowing to write to the Bluetooth chip's RAM. This feature is used for firmware patches.

1 year ago 10 2 1 0
Original post on infosec.exchange

The 3rd episode of our #OffensiveRust series, "Streamlining vulnerability research with #IDAPro and #Rust", is here! @raptor introduces new tools to assist with reverse engineering and vulnerability research, based on @HexRaysSA IDA and @binarly_io idalib […]

1 year ago 2 3 0 0
Post image Post image

TP-Link (Tapo) C210 V2 cloud camera: bootloader vulnerability and firmware decryption

watchfulip.github.io/28-12-24/tp-...

#embedded #infosec

1 year ago 6 2 0 0
Post image

“Decompiling Mobile Apps With AI Language Models” by @trufae.bsky.social at @nowsecure.bsky.social www.nowsecure.com/blog/2025/01...

1 year ago 12 6 1 0

[RSS] Linux Kernel TLS Part 1


u1f383.github.io ->


Original->

1 year ago 1 1 0 0
Post image

All videos from The 38th Chaos Communication Congress (38C3) 2024:

media.ccc.de/b/congress/2...

#cybersecurity #informationsecurity #hacking #exploitation #iOS #android #apple #exploitation #reverseengineering #vulnerability

1 year ago 30 17 0 1
Example LLM prompt from “From One Thousand Pages of Specification to
Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT Devices”

Example LLM prompt from “From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT Devices”

“From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT Devices”

With a focus on the Matter network protocol, walks through the process of using an LLM to transform a human-readable spec into something a fuzzer can leverage.

1 year ago 3 1 1 0

Hello new (fuzzing) followers! I haven’t done much fuzzing recently unfortunately but here’s an example of past work I’m happy to talk about: mhlakhani.com/static/pdf/F...

Still hope to get back to it one day. But for now I’m still in the security / systems space (and dabbling in AI)

1 year ago 9 2 0 0
Preview
GitHub - microsoft/markitdown: Python tool for converting files and office documents to Markdown. Python tool for converting files and office documents to Markdown. - microsoft/markitdown

Microsoft just released a tool that lets you convert Office files to Markdown. Never thought I'd see the day.

Google also added Markdown export to Google Docs a few months ago.

github.com/microsoft/markitdown

1 year ago 524 127 24 24
Advertisement
Preview
GitHub - fishttp/awesome-bluesky: A list of all known tools available for the Bluesky platform A list of all known tools available for the Bluesky platform - fishttp/awesome-bluesky

github.com/fishttp/awes...

1 year ago 134 47 8 2
Post image
1 year ago 37 12 2 0
Preview
sdk.blue A curated list of libraries & SDKs for the Bluesky API and AT Protocol

I'm launching a new website: sdk.blue - a list of all libraries/SDKs for building things on #ATProto, grouped by language 🙂

If I forgot anything important, or you have an ATProto/Bluesky library that you think would be a good fit there (or if I should remove anything), please send me a PR :) #atdev

1 year ago 889 232 66 15
LIEF Disassembler API based on LLVM MC

LIEF Disassembler API based on LLVM MC

So for my first post on Bluesky, I'm happy to share that LIEF (extended) is now providing an API to disassemble code (backed by the LLVM MC layer).

This disassembler is integrated with other functionalities
like dyldsc or DWARF info.

You can checkout lief.re/doc/latest/e... for the details.

1 year ago 30 9 1 1
Preview
Advanced Fuzzing With LibAFL @ Ekoparty 2024 Advanced Fuzzing With LibAFL Dominik Maier Ekoparty 2024-11-15 1

Slides for my @ekoparty talk "Advanced Fuzzing
With LibAFL"
- >
docs.google.com/presentation...

1 year ago 44 21 0 1

C Harness to #LibAFL

github.com/v-p-b/libfuzzer_kfx/blob...

I nice part of making an archive of my Twitter posts is that I realize I wrote stuff like this o.O #fuzzing


Original->

1 year ago 5 3 0 0
Post image

Just discovered 10 memory corruption vulnerabilities in the popular Mongoose Web Server (11k stars on GitHub) by fuzzing its embedded TLS stack protocol with @aflplusplus.bsky.social. More technical details here: www.nozominetworks.com/blog/hunting...

#fuzzing #afl #vulnerability #tls

1 year ago 21 5 2 0

My DM is open if you’re interested in more technical details about the research :)

1 year ago 0 0 0 0
Post image

Just discovered 10 memory corruption vulnerabilities in the popular Mongoose Web Server (11k stars on GitHub) by fuzzing its embedded TLS stack protocol with @aflplusplus.bsky.social. More technical details here: www.nozominetworks.com/blog/hunting...

#fuzzing #afl #vulnerability #tls

1 year ago 21 5 2 0
Post image

Physics vs. Magic xkcd.com/2904

2 years ago 2410 513 27 31
Advertisement