dreadcode's profile picture. Tortures computers for fun and profit. Interested in network security monitoring, machine learning, Golang and Rust. Shellscript ninja. Will debug for food.

dreadl0ck

@dreadcode

Tortures computers for fun and profit. Interested in network security monitoring, machine learning, Golang and Rust. Shellscript ninja. Will debug for food.

고정된 트윗

Published my Bachelor Thesis: "Implementation and evaluation of secure and scalable anomaly-based network intrusion detection" along with my network traffic analysis framework: github.com/dreadl0ck/netc… #golang #IDS #NSM #DeepLearning #ML


dreadl0ck 님이 재게시함

Attacking UNIX Systems via CUPS, Part I evilsocket.net/2024/09/26/Att…


dreadl0ck 님이 재게시함

I'm glad everyone has discovered memory safe languages after several decades. Now can we start looking at secure package management or are we just going to import memory safe rando libs from ninja876 on Github forever?


dreadl0ck 님이 재게시함

My dystopian vision of an AI-powered future is that LLMs drives down the cost of generating long text even further, and the only way for readers to keep up is to use LLMs to summarize.

Okay here's a ridiculous (but true) take: word processing is bad. Before it, document length was bounded by the human capacity to copy long-form text. After word processing, the tax & legal codes grew without check. And became incomprehensible to anyone but career experts.

pronounced_kyle's tweet image. Okay here's a ridiculous (but true) take: word processing is bad.

Before it, document length was bounded by the human capacity to copy long-form text.

After word processing, the tax & legal codes grew without check. And became incomprehensible to anyone but career experts.


Guest: “Is that a RAM stick glued to your door?” Me: “Yes. Old memories.”

dreadcode's tweet image. Guest: “Is that a RAM stick glued to your door?”
Me: “Yes. Old memories.”

dreadl0ck 님이 재게시함

Best security quote I heard this week: "Do you want to mitigate against an auditor, or against an attacker?"


Finally, a book for dealing with those rusty locks 🔒 thanks @m_ou_se

dreadcode's tweet image. Finally, a book for dealing with those rusty locks 🔒 thanks @m_ou_se

dreadl0ck 님이 재게시함

Bellingcat and investigative partners @derspiegel and @the_ins_ru have discovered a hitherto secretive group of engineers involved in Russian missile strikes on Ukraine. These strikes have killed hundreds and left millions without heating or power bellingcat.com/news/uk-and-eu…


dreadl0ck 님이 재게시함

You can force any v8/Electron process to execute arbitrary js code (child_process, http, etc) by forcefully enabling and abusing the builtin debug mechanism ... here's VS Code executing Calc, but I suspect any Electron app is susceptible 🔥 it works with SIP enabled on macOS

evilsocket's tweet image. You can force any v8/Electron process to execute arbitrary js code (child_process, http, etc) by forcefully enabling and abusing the builtin debug mechanism ... here's VS Code executing Calc, but I suspect any Electron app is susceptible 🔥 it works with SIP enabled on macOS

dreadl0ck 님이 재게시함

@BadgeteamNL thanks for the great #MCH2022 badge - here's my Music Computing Handheld app, to be found in the Hatchery in ESP32 - Games. Happy soloing


dreadl0ck 님이 재게시함

Do you know you can set up a custom Transform server in #Maltego? The #DittoTRX Transform developed by @dreadcode can be used to investigate #IDNHomographAttack and imposter domain on various websites. Learn how to set it up here: maltego.com/blog/dittotrx-…


dreadl0ck 님이 재게시함

The Trojan Source vulnerability allows supply-chain attacks on software written in C, C++, Go, Java, Javascript, Python and Rust. We're releasing details after a 99-day coordinated disclosure period, and some of these compilers will be patched quickly. See lightbluetouchpaper.org/2021/11/01/tro…


dreadl0ck 님이 재게시함

Wow, just realized C is turning 50 next year. Not sure how to tell students that we're learning about security problems caused by a language that's half a century old.


dreadl0ck 님이 재게시함

Memory safety in a huge codebase is hard. We've published some work and an update on our work in the Chromium codebase - security.googleblog.com/2021/09/an-upd….


dreadl0ck 님이 재게시함

We're releasing CapLoader 1.9 today! 🔁 Better detection of periodic beacons 🔍 More L7 protocols identified 🚀 Faster 🛠️ Improved filtering of flows 🔭 OSINT lookups w/ CIRCL, ThreatFox, RIPEstat etc. netresec.com/?b=2159bda


Ever dreamed about analysing a PCAP file properly in Maltego? Next netcap release will have a full blown Maltego integration, currently have ~200 entities, ~120 local transforms and 4 machines :) #madewithmaltego #golang #netcap

dreadcode's tweet image. Ever dreamed about analysing a PCAP file properly in Maltego? Next netcap release will have a full blown Maltego integration, currently have ~200 entities, ~120 local transforms and 4 machines :) #madewithmaltego #golang #netcap
dreadcode's tweet image. Ever dreamed about analysing a PCAP file properly in Maltego? Next netcap release will have a full blown Maltego integration, currently have ~200 entities, ~120 local transforms and 4 machines :) #madewithmaltego #golang #netcap
dreadcode's tweet image. Ever dreamed about analysing a PCAP file properly in Maltego? Next netcap release will have a full blown Maltego integration, currently have ~200 entities, ~120 local transforms and 4 machines :) #madewithmaltego #golang #netcap
dreadcode's tweet image. Ever dreamed about analysing a PCAP file properly in Maltego? Next netcap release will have a full blown Maltego integration, currently have ~200 entities, ~120 local transforms and 4 machines :) #madewithmaltego #golang #netcap

Open sourced my Maltego (@MaltegoHQ) integration for @evilsocket's ditto tool and wrote a blogpost about it: dreadl0ck.net/posts/ditto-trx Happy graphical link analysis! #madewithmaltego #golang #ditto


Loading...

Something went wrong.


Something went wrong.