laughing_bit's profile picture. Born to code, live to hack. Fond of InfoSec, low level software and mirabelles. Author of @chrysalide_ref, member of @ZenkSecurity. Tweets are my tweets.

Laughing Bit

@laughing_bit

Born to code, live to hack. Fond of InfoSec, low level software and mirabelles. Author of @chrysalide_ref, member of @ZenkSecurity. Tweets are my tweets.

Laughing Bit reposted

My writeup to #flareon12 challenge 6 xd

eversinc33's tweet image. My writeup to #flareon12 challenge 6 xd

Laughing Bit reposted

Exalyze 1.0 is out 🥳 What's new on it? - Analysis pipeline rebuild for transparent updates - Yara generation (opcodes) have been improved - Pivots added for IP/domains to @virustotal @shodanhq @censysio @onyphe @fofabot See you on exalyze.io


Laughing Bit reposted

A newer image of a Starlink photobombing a Maxar satellite capture. While the novelty may be cool at first, it definitely makes me worry about these satellites ruining important captures. Source: linkedin.com/posts/susanne-…

Harry__Stranger's tweet image. A newer image of a Starlink photobombing a Maxar satellite capture. While the novelty may be cool at first, it definitely makes me worry about these satellites ruining important captures.

Source: linkedin.com/posts/susanne-…

Laughing Bit reposted

Documented instructions for setting up KGDB on Pixel 8. Including getting kernel log over UART via USB-Cereal, building/flashing custom kernel, breaking into KGDB via /proc/sysrq-trigger or by sending SysRq-G over serial, dealing with watchdogs, etc. xairy.io/articles/pixel…


Laughing Bit reposted

Today was my last day as a pentester at Bsecure, and it feels a bit surreal. After a three-year journey of hunting on the side, I’m finally ready to go all-in as a full-time bug bounty hunter. To celebrate this milestone, I've written an article sharing the full story. It’s a…

Geluchat's tweet image. Today was my last day as a pentester at Bsecure, and it feels a bit surreal. After a three-year journey of hunting on the side, I’m finally ready to go all-in as a full-time bug bounty hunter.
To celebrate this milestone, I've written an article sharing the full story. It’s a…

Laughing Bit reposted

For the first time in history, the #1 hacker in the US is an AI. (1/8)


Laughing Bit reposted

@_qwerty_po and I exploited a VSock 1-day in Google kernelCTF back in *February*, securing $71,337 🥳 (CVE-2025-21756, exp237/exp249) And I’ve just published the write-up: github.com/google/securit… A kernel developer reviewing a patch for a separate VSock bug I submitted…


Laughing Bit reposted

🚨🚨🚨We just broke everyone’s favorite CTF PoW🚨🚨🚨 Our teammate managed to achieve a 20x SPEEDUP on kctf pow through AVX512 on Zen 5. Full details here: anemato.de/blog/kctf-vdf The Sloth VDF is dead😵 This is why kernelCTF no longer has PoW!

anemato.de

Beating the kCTF PoW with AVX512IFMA for $51k

PoW is gone 🦀🦀


Laughing Bit reposted

I wrote-up how I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation. Link to the blog post below 👇


Laughing Bit reposted

We are back😎 Say hello to our kernelCTF submission for CVE-2025-37752🩸 Who would have thought you could pwn a kernel with just a 0x0000 written 262636 bytes out of bounds? Read the full writeup at: syst3mfailure.io/two-bytes-of-m… 👀


Laughing Bit reposted

I’ve posted a detailed explanation of why the claimed ESP32 Bluetooth chip “backdoor” is not a backdoor. It’s just a poor security practice which is found in other Bluetooth chips by vendors like Broadcom, Cypress, and Texas Instruments too. darkmentor.com/blog/esp32_non…

🔷 A backdoor in the ESP32 chip would allow it to infect millions of devices. Miguel Tarascó and @antonvblanco have revealed this at the @rootedcon this backdoor and presented a tool to perform Bluetooth security audits on any gadget. tarlogic.com/news/backdoor-…



Laughing Bit reposted

Can you spot the bug? The goal is to leak the secret.

ifsecure's tweet image. Can you spot the bug? The goal is to leak the secret.

Laughing Bit reposted

I believe this sample is proof that J-magic is strongly related to SEASPY2 as Lumen suspected: virustotal.com/gui/file/9bb7a… Seems to be the only SEASPY2 sample on VT, but it contains the same public key as J-Magic so same operators. blog.lumen.com/the-j-magic-sh…

jaydinbas's tweet image. I believe this sample is proof that J-magic is strongly related to SEASPY2 as Lumen suspected:

virustotal.com/gui/file/9bb7a…

Seems to be the only SEASPY2 sample on VT, but it contains the same public key as J-Magic so same operators.

blog.lumen.com/the-j-magic-sh…

Laughing Bit reposted

Investigating an "evil" RJ45 dongle: lcamtuf.substack.com/p/investigatin…


Laughing Bit reposted

I’m sure this Threat Actor Naming standard will be nothing like this XKCD….

ShaneHuntley's tweet image. I’m sure this Threat Actor Naming standard will be nothing like this XKCD….

🤔 “MISP-standard.org - Introducing the MISP Threat Actor Naming Standard” misp-standard.org/blog/Naming-Th…



Laughing Bit reposted

Guy: Rewrites docs for clarity Microsoft: No, we want the documentation readable for AI not humans

LukasHozda's tweet image. Guy: Rewrites docs for clarity

Microsoft: No, we want the documentation readable for AI not humans

Laughing Bit reposted

There is an arms race going on between loader developers and security vendors. I came across a particularly egregious example of this recently. I wish to share with you. 🧵


Laughing Bit reposted

Watch Rob Joyce (@RGB_Lights), former head of the NSA Cybersecurity Directorate, discuss threats against Linux critical infrastructure with Sandfly founder @CraigHRowland. They discuss nation state objectives and defense strategies.


Laughing Bit reposted

I've written a post on SELinux and some public bypasses for Android kernel exploitation. It's especially relevant for Samsung and Huawei devices due to their use of hypervisors. Check it out here: klecko.github.io/posts/selinux-…


Laughing Bit reposted

🚨 New Linux Kernel vulnerability (CVE-2024-27394) discovered & patched by Theori! 🔗 blog.theori.io/deep-dive-into… Our researcher @v4bel at #Theori identified a critical #UAF vulnerability in TCP-AO caused by a race condition in the #RCU API. Using techniques from the ExpRace paper,…


Loading...

Something went wrong.


Something went wrong.