🎥 Eyes wide shut! David Berard of @synacktiv.com just breached the @Ubiquiti AI Pro surveillance system at #Pwn2Own. He also serenaded us with round of "Baby Shark" played through the speaker. He's off to the disclosure room with an ear worm and the details.
23.10.2025 11:10 — 👍 3 🔁 4 💬 0 📌 0
Confirmed! The team from @synacktiv.com used a buffer overflow to exploit the Phillips Hue Bridge. Their unique bug earns them $20,000 and 4 Master of Pwn points. #Pwn2Own
22.10.2025 17:11 — 👍 7 🔁 4 💬 0 📌 0
📲 Debugging the Pixel 8 kernel via KGDB
Instructions for getting kernel log, building custom kernel, and enabling KGDB on Pixel 8
Documented instructions for setting up KGDB on Pixel 8.
Including getting kernel log over UART via USB-Cereal, building/flashing custom kernel, breaking into KGDB via /proc/sysrq-trigger or by sending SysRq-G over serial, dealing with watchdogs, etc.
xairy.io/articles/pix...
28.07.2025 20:20 — 👍 4 🔁 3 💬 0 📌 1
Dumping firmware from JieLi chips
JieLi chips are fairly common in Bluetooth audio devices, but they are also becoming more common in miscellaneous devices. Fortunately, retrieving the firmware is mostly straightforward.
14.04.2025 17:22 — 👍 3 🔁 5 💬 1 📌 0
A light blue diagram depicting the sea, with the water's surface at the top, and just below it is an outline of the Mary Rose, with the depth (12m, 40ft or 6.7 fathoms). There is a line showing the seabed, which takes a rapid dive into the vertical...
On the anniversary of the sinking of the Titanic, we thought we'd answer a question that's often asked,
"If they raised the Mary Rose, why not raise the Titanic?"
Allow our scaled diagram to explain...
15.04.2025 08:21 — 👍 13193 🔁 5359 💬 217 📌 1318
A lamppost covered in dark vines that resemble a creature with long hair bent over. When the light is on, it looks like the head/skull is glowing.
I grew up on a diet of Scary Stories to Tell in the Dark... I swear these vines covering a lamppost in Wroclaw, Poland are straight out of my childhood nightmares.
10.04.2025 07:27 — 👍 3568 🔁 620 💬 56 📌 46
This is fake but if we boost it enough someone from the administration will claim it’s true during the congressional hearings so you know what to do
27.03.2025 09:47 — 👍 23 🔁 5 💬 0 📌 0
simpsons image. march yelling "war thunder no!" then bart, labelled "war thunder" says "what?" the marge says "sorry, force of habit"
24.03.2025 22:23 — 👍 6 🔁 2 💬 0 📌 0
Flyer for the Phrack 40th anniversary edition CFP. It contains the text of the CFP at phrack.org, with additional text "CFP EXTEND!! Papers due June 15 2025" and "Phrack Since 1985"
We heard you needed some more time, so we wanted to let you cook.
We decided to push the Phrack 72 CFP deadline back until June 15th.
Stay tuned for upcoming Phrack events.
Print this flyer out and give it to someone IRL!!
17.03.2025 13:58 — 👍 115 🔁 53 💬 1 📌 5
For $20,000/month, I will personally google stuff and paraphrase it for you into mostly-accurate answers.
05.03.2025 18:57 — 👍 58 🔁 7 💬 6 📌 2
Pumpkin (@u1f383 on X) does cool work. Here is another cool read about an interesting race condition involving signal handling
u1f383.github.io/linux/2025/0...
26.02.2025 08:42 — 👍 4 🔁 4 💬 0 📌 0
I made an ImHex pattern file for the ftab file format used for Apple C1 firmware and Apple accessories
gist.github.com/matteyeux/d1...
21.02.2025 06:41 — 👍 4 🔁 1 💬 0 📌 0
OpenSSH: Release Notes
OpenSSH release notes
OpenSSH 9.9p2 has just been released with fixes for two security problems reported by the Qualys Security Advisory Team: a denial-of-service in the default configuration and a host impersonation by on-path attackers when VerifyHostKeyDNS is enabled (off by default).
www.openssh.com/releasenotes...
18.02.2025 09:37 — 👍 14 🔁 8 💬 0 📌 0
Microsoft's own research confirms something that was already pretty obvious: relying on a text generating machine to come up with answers erodes critical thinking, and is a method favoured by those who never liked doing critical thinking in the first place
advait.org/files/lee_20...
09.02.2025 10:15 — 👍 7594 🔁 2556 💬 137 📌 300
They found a way to litter from space
06.02.2025 00:16 — 👍 2839 🔁 903 💬 67 📌 28
for anyone interested in linux kernel or android security research, i'm experimenting with a custom feed here bsky.app/profile/did:...
03.12.2024 19:45 — 👍 5 🔁 2 💬 0 📌 0
Earlier this year, I used a 1day to exploit the kernelCTF VRP LTS instance. I then used the same bug to write a universal exploit that worked against up-to-date mainstream distros for approximately 2 months.
osec.io/blog/2024-11...
28.11.2024 12:54 — 👍 32 🔁 10 💬 0 📌 0
Introducing NachoVPN: One VPN Server to Pwn Them All
AmberWolf Security Research Blog
New platform, who dis? It me, and @johnnyspandex.bsky.social dropping some VPN client exploit freshness! 🌮🔒
Today, we're releasing NachoVPN, our VPN client exploitation tool, as presented at SANS HackFest Hollywood. Get it on the @amberwolfsec.bsky.social blog:
blog.amberwolf.com/blog/2024/no...
26.11.2024 10:47 — 👍 13 🔁 11 💬 0 📌 2
Interesting paper by Erin Avllazagaj to automatically find Linux kernel objects being potentially useful for privilege escalation, tool is called SCAVY. www.usenix.org/system/files...
22.11.2024 09:44 — 👍 5 🔁 2 💬 0 📌 0
Qualys is at it again:
https://seclists.org/oss-sec/2024/q4/108
LPEs in needrestart (CVE-2024-48990, CVE-2024-48991, CVE-2024-48992,
CVE-2024-10224, and CVE-2024-11003)
Original post
19.11.2024 21:07 — 👍 3 🔁 3 💬 0 📌 1
A view from a lake in the mountains
Touching grass
What else to remain sane?
18.11.2024 16:18 — 👍 5 🔁 0 💬 1 📌 0
Patch your crap
14.11.2024 20:14 — 👍 1 🔁 1 💬 0 📌 0
It would be really nice to be able to click on a starter pack and instead of just doing “follow all”, turn it instantly into a pinned feed
10.11.2024 16:45 — 👍 2530 🔁 224 💬 73 📌 38
OpenSSH 9.6 has just been released: openssh.com/releasenotes...
Among other things, this release contains a fix for the so-called Terrapin Attack (terrapin-attack.com)
18.12.2023 15:46 — 👍 3 🔁 3 💬 0 📌 1
Culture Prime, c’est le média social culturel créé par les six entreprises de l’audiovisuel public.
Thésard en phase terminale. Paléolithiquement incorrect. Anarcho-bordeliste de jardin.
Social media should be centered around people, not platforms. Let's build bridges, not walls. That's why we're building Bridgy Fed and Bounce.
Learn more: https://anew.social
Head of Security Lab - Amnesty International
Hunting spyware and unlawful surveillance targeting activists and civil society.
For help with digital forensics or suspect spyware threats contact: https://securitylab.amnesty.org/get-help/
Social networking technology created by Bluesky.
Developer-focused account. Follow @bsky.app for general announcements!
Bluesky API docs: docs.bsky.app
AT Protocol specs: atproto.com
Hello everyone, Asahi Lina here! I'm a developer VTuber! ▶️ lina.yt/magic
EN/日本語|she/her|🎨 #AsahiLinArt
My gf: @cyan.yt 🩵|We are @thgirls.yt
Model x.com/NananoNanase
Design x.com/shiranui_illust
PFP x.com/7783__
🐘 @lina@vt.social
📨 lina@lina.yt
The official Bluesky account of the OpenStreetMap foundation
twitter : @epsilon_sec
web site : epsilon-sec.com
AT Protocol App network and SDKs coming soon.
slices.network
https://tangled.org/@slices.network/slices
join the discord: https://discord.gg/NqSd3eW8S8
By @chadtmiller.com
Cartoonist and Illustrator. My book of science cartoons, PHYSICS FOR CATS, is available now! www.tomgauld.com
L’Institut des hautes études de défense nationale
"Comprendre pour agir, se comprendre pour agir ensemble"
Suivez notre actualité : https://ihedn.fr/
The French open source alternative to Google Maps.
L'alternative souveraine et écologique à Google Maps.
Dispo universellement sur le Web.
Basé sur OpenStreetMap.
Fait à Rennes.
https://cartes.app
Enseignant chercheur en économie.
Économie politique des transformations de l'Etat social.
#econsky
Humanitaire pour l'#Ukraine à Safe, journaliste indépendant #Nafo
Screenshots of your setup at https://deskto.ps
a @jcs.org project
Follow me to receive notifications via DM whenever you're added to a starter pack, block list, feed or when someone blocks your account.
Follow @unsub.blocks.listifications.app to opt out of direct block notifications.
We make IDA, the leading tool for binary analysis, trusted by top cybersecurity teams for reverse engineering and malware defense.