offethhacker's profile picture.

Ethical Hacker

@offethhacker

Ethical Hacker reposted

Banana Pi BPI-CM6 design with SpacemiT K1 8 core RISC-V chip, CPU integrates 2.0 TOPs AI computing power. 8/16G DDR and 8/16/32/128G eMMC. support DeepX AI. will comming soon. docs.banana-pi.org/en/BPI-CM6/Ban… #riscv #EdgeComputing #bananapi #raspberrypi

sinovoip's tweet image. Banana Pi BPI-CM6 design with SpacemiT K1 8 core RISC-V chip, CPU integrates 2.0 TOPs AI computing power. 8/16G DDR and 8/16/32/128G eMMC. support DeepX AI. will comming soon.
docs.banana-pi.org/en/BPI-CM6/Ban…
#riscv  #EdgeComputing #bananapi #raspberrypi
sinovoip's tweet image. Banana Pi BPI-CM6 design with SpacemiT K1 8 core RISC-V chip, CPU integrates 2.0 TOPs AI computing power. 8/16G DDR and 8/16/32/128G eMMC. support DeepX AI. will comming soon.
docs.banana-pi.org/en/BPI-CM6/Ban…
#riscv  #EdgeComputing #bananapi #raspberrypi
sinovoip's tweet image. Banana Pi BPI-CM6 design with SpacemiT K1 8 core RISC-V chip, CPU integrates 2.0 TOPs AI computing power. 8/16G DDR and 8/16/32/128G eMMC. support DeepX AI. will comming soon.
docs.banana-pi.org/en/BPI-CM6/Ban…
#riscv  #EdgeComputing #bananapi #raspberrypi

Ethical Hacker reposted

🚨 We taught LLMs to write bug-finding tools instead of just finding bugs! KNighter synthesizes static analysis checkers from patches & discovered 92 new, long-lived bugs in Linux (77 confirmed, 30 CVEs) 🐛 Paper: arxiv.org/abs/2503.09002 Code: github.com/ise-uiuc/KNigh…

cy1yang's tweet image. 🚨 We taught LLMs to write bug-finding tools instead of just finding bugs!

KNighter synthesizes static analysis checkers from patches & discovered 92 new, long-lived bugs in Linux  (77 confirmed, 30 CVEs) 🐛

Paper: arxiv.org/abs/2503.09002
Code: github.com/ise-uiuc/KNigh……

Ethical Hacker reposted

Here are the slides for my talk yesterday at Objective By the Sea! Tons of incredible research and researchers here in Ibiza :) dillonfrankesecurity.com/Objective-By-t…


Ethical Hacker reposted

As promised, a blog post on Diffing 7-Zip for CVE-2025-11001. Enjoy :) pacbypass.github.io/2025/10/16/dif…

Wrote an exploit for CVE-2025-11001 in 7-zip Pretty cool bug, had fun diffing it. Blog post coming soon github.com/pacbypass/CVE-…



Ethical Hacker reposted

Just posted a write-up on a DC hang traced to a deadlock inside LSASS. I break down call stacks, the blocked threads, and how doing LDAP work in DllMain triggered the issue. medium.com/@Debugger/serv…


Ethical Hacker reposted

Beginners introduction to Linux kernel rootkits inferi.club/post/the-art-o… #Linux #infosec

0xor0ne's tweet image. Beginners introduction to Linux kernel rootkits

inferi.club/post/the-art-o…

#Linux #infosec

Ethical Hacker reposted

Serious bugs often occur in third-party components integrated by other software. @ifsecure and I found this vulnerability in the Dolby Unified Decoder. It affects Android, iOS and Windows among other platforms, sometimes 0-click. project-zero.issues.chromium.org/issues/4280754…


Ethical Hacker reposted

Interesting read. Using blockchain and smart contracts to host and load part of the JS payload delivery. cloud.google.com/blog/topics/th…


Ethical Hacker reposted

I spent some time exploring browser cache smuggling, where visiting a webpage can lead to malware delivery. Surprisingly, it is possible to execute Chrome’s original cache file without renaming it, while also achieving persistence. More details below: medium.com/@danemeth90/re…


Ethical Hacker reposted

The following vulnerabilities have been added to our feed: - CVE-2025-33053: Microsoft Windows Internet Shortcut Files RCE - CVE-2025-25257: Fortinet FortiWeb RCE - CVE-2025-50154: Microsoft Windows File Explorer NTLM Leak crowdfense.com/n-day-feed/

crowdfense.com

N-day Vulnerability Intelligence Feed - Crowdfense

Boost Red Team exercises with our N-Day Feed: real-time, high-risk vulnerabilities, PoC code, and insights for advanced threat simulation.


Ethical Hacker reposted

One‑Click Memory Corruption in Alibaba’s UC Browser: Exploiting patch-gap V8 vulnerabilities to steal your data interruptlabs.co.uk/articles/one-c… by @InterruptLabs #MobileSecurity #Browser #exploit #infosec


Ethical Hacker reposted

Forgive me if I am wrong (developer.arm.com/documentation/…): On my machine both T0SZ and T1SZ specify a value of 17. This means 48-bit VAs are in use. According to this psuedo-code from ARM documentation the "bottom" PAC bit is defined as 64 - TXSZ, which would be bit 47.

33y0re's tweet image. Forgive me if I am wrong (developer.arm.com/documentation/…):

On my machine both T0SZ and T1SZ specify a value of 17. This means 48-bit VAs are in use. According to this psuedo-code from ARM documentation the "bottom" PAC bit is defined as 64 - TXSZ, which would be bit 47.

Ethical Hacker reposted

Trend Micro's Dove Chiu & Lucien Chuang uncovered an attack campaign exploiting the Cisco SNMP vulnerability CVE-2025-20352, allowing remote code execution and rootkit deployment on unprotected devices. trendmicro.com/en_us/research…

virusbtn's tweet image. Trend Micro's Dove Chiu & Lucien Chuang uncovered an attack campaign exploiting the Cisco SNMP vulnerability CVE-2025-20352, allowing remote code execution and rootkit deployment on unprotected devices. trendmicro.com/en_us/research…

Ethical Hacker reposted

Not sure how I feel about this. Good research, but not anywhere near a real life scenario.. I have seen a lot of talk about C2-less malware, but nothing can ever replace a general c2 control, unless the aim is just "destruction via ransomeware".. - just my 2 cents

Can we eliminate the C2 server entirely and create truly autonomous malware? On the Dreadnode blog, Principal Security Researcher @0xdab0 details how we developed an entirely local, C2-less malware that can autonomously discover and exploit one type of privilege escalation…

dreadnode's tweet image. Can we eliminate the C2 server entirely and create truly autonomous malware?

On the Dreadnode blog, Principal Security Researcher @0xdab0 details how we developed an entirely local, C2-less malware that can autonomously discover and exploit one type of privilege escalation…


Ethical Hacker reposted

New blog post in a while — this one covers "executing" shellcode from non-executable memory and "bypassing" DEP/NX. Since I didn’t have a proofreader this time, I’d really appreciate it if you could let me know about any errors or misinterpretations you spot in the article.…

VirtualAllocEx's tweet image. New blog post in a while — this one covers "executing" shellcode from non-executable memory and "bypassing" DEP/NX.

Since I didn’t have a proofreader this time, I’d really appreciate it if you could let me know about any errors or misinterpretations you spot in the article.…

Ethical Hacker reposted

I put a BOF loader in a BOF so that you can run BOFs from a BOF. If you've had issues getting a BOF to work with CS's BOF loader in the past, you now have a drop-in way to get a little bit more compatibility. github.com/0xTriboulet/In…


Ethical Hacker reposted

Quick post regarding sqlite injection. TLDR, when using it for file creation, create a VIEW rather than a TABLE: muffsec.com/blog/file-crea…


Ethical Hacker reposted

In regular GRPO, gradients update parameters. In Training-Free GRPO, the context updates instead. Each round: 1. Generate multiple rollouts 2. Compare them 3. Extract natural-language “lessons” 4. Add those to an experience library That experience library = the new brain.

rryssf_'s tweet image. In regular GRPO, gradients update parameters.

In Training-Free GRPO, the context updates instead.

Each round:

1. Generate multiple rollouts
2. Compare them
3. Extract natural-language “lessons”
4. Add those to an experience library

That experience library = the new brain.

Loading...

Something went wrong.


Something went wrong.