pgt_r2ursystem's profile picture.

pgt

@pgt_r2ursystem

pgt reposted

hardened_malloc version 13 released: github.com/GrapheneOS/har… See the linked release notes for a summary of the improvements over the previous release and a link to the full changelog. Forum discussion thread: discuss.grapheneos.org/d/16445-harden… This is a standalone release for use…

github.com

Release 13 · GrapheneOS/hardened_malloc

Changes in version 13: add support for ARM hardware memory tagging (MTE) which has been shipped in production on GrapheneOS for the past year (see the README section on memory tagging for details)...


pgt reposted

Due to the current events I'm selling my #hexacon2024 ticket. If anyone wants it please DM me.


pgt reposted

where all backdoor plot begins: mail-archive.com/xz-devel@tukaa…


pgt reposted

backdoor in upstream xz/liblzma leading to ssh server compromise openwall.com/lists/oss-secu…


pgt reposted

Finally there is a PCILeech Thunderbolt device! ZDMA offers much improved PCILeech DMA performance 😈 github.com/ufrisk/pcileec…

UlfFrisk's tweet image. Finally there is a PCILeech Thunderbolt device! ZDMA offers much improved PCILeech DMA performance 😈

github.com/ufrisk/pcileec…

Created a PoC for Arch Linux today (CVE-2023-4911)

pgt_r2ursystem's tweet image. Created a PoC for Arch Linux today (CVE-2023-4911)

pgt reposted

The best of bests security vulnerability report in 2023 which is the solid evidence about we're all trapped in 90s!

Looney Tunables: Local Privilege Escalation in the glibc's ld.so (CVE-2023-4911) qualys.com/2023/10/03/cve…



pgt reposted

Introducing deep-TEMPEST: a deep learning method that recovers great quality images from unintentional electromagnetic emanations of HDMI. Great work (in progress) by E. Martinez, S. Fernandez and G. Varela 💪💪 (co-mentored with @muse_pablo). Expect more news in the next weeks.


pgt reposted

Van Eck phreaking... It ACTUALLY works?!?!

Introducing deep-TEMPEST: a deep learning method that recovers great quality images from unintentional electromagnetic emanations of HDMI. Great work (in progress) by E. Martinez, S. Fernandez and G. Varela 💪💪 (co-mentored with @muse_pablo). Expect more news in the next weeks.



pgt reposted

Dirty Pagetable: A Novel Exploitation Technique To Rule Linux Kernel An article by @NVamous about the Dirty Pagetable exploitation technique. yanglingxi1993.github.io/dirty_pagetabl…


pgt reposted

Nice blog post on exploiting VirtualBox on Windows (CVE-2023-21987 and CVE-2023-21991) qriousec.github.io/post/vbox-pwn2… #virtualbox #infosec

0xor0ne's tweet image. Nice blog post on exploiting VirtualBox on Windows (CVE-2023-21987 and CVE-2023-21991)

qriousec.github.io/post/vbox-pwn2…

#virtualbox #infosec
0xor0ne's tweet image. Nice blog post on exploiting VirtualBox on Windows (CVE-2023-21987 and CVE-2023-21991)

qriousec.github.io/post/vbox-pwn2…

#virtualbox #infosec
0xor0ne's tweet image. Nice blog post on exploiting VirtualBox on Windows (CVE-2023-21987 and CVE-2023-21991)

qriousec.github.io/post/vbox-pwn2…

#virtualbox #infosec
0xor0ne's tweet image. Nice blog post on exploiting VirtualBox on Windows (CVE-2023-21987 and CVE-2023-21991)

qriousec.github.io/post/vbox-pwn2…

#virtualbox #infosec

pgt reposted

Sekiryu V0.0.2 Is out! A Comprehensive toolkit to pilot Ghidra Headless, including some nice features such as vulnerability hunting, BinExport, etc. It allows users to load their own script and even interact with the "API" More => github.com/20urc3/Sekiryu

github.com

GitHub - 20urc3/Sekiryu: Comprehensive toolkit for Ghidra headless.

Comprehensive toolkit for Ghidra headless. Contribute to 20urc3/Sekiryu development by creating an account on GitHub.


pgt reposted

python memfd_create() oneliner: python3 -c "import os;os.fork()or(os.setsid(),print(f\"/proc/{os.getpid()}/fd/{os.memfd_create(str())}\"),os.kill(os.getpid(),19))" This prints the path of a memfd, which you can use to do whatever you want (like fileless ELF execution!)

David3141593's tweet image. python memfd_create() oneliner:

python3 -c "import os;os.fork()or(os.setsid(),print(f\"/proc/{os.getpid()}/fd/{os.memfd_create(str())}\"),os.kill(os.getpid(),19))"

This prints the path of a memfd, which you can use to do whatever you want (like fileless ELF execution!)

pgt reposted

📣 Announcing the tmp.0ut Volume 3 Call For Papers! For information on submission guidelines and ways to contact us, visit the CFP page: tmpout.sh/blog/vol3-cfp.…

tmpout's tweet image. 📣 Announcing the tmp.0ut Volume 3 Call For Papers!

For information on submission guidelines and ways to contact us, visit the CFP page: tmpout.sh/blog/vol3-cfp.…

pgt reposted

The time finally arrived! Reach out to us to contribute!

📣 Announcing the tmp.0ut Volume 3 Call For Papers! For information on submission guidelines and ways to contact us, visit the CFP page: tmpout.sh/blog/vol3-cfp.…

tmpout's tweet image. 📣 Announcing the tmp.0ut Volume 3 Call For Papers!

For information on submission guidelines and ways to contact us, visit the CFP page: tmpout.sh/blog/vol3-cfp.…


pgt reposted

Of course the master heap #xdev @qualys managed to achieve significant progress in #exploiting the recent double-free #vulnerability in #OpenSSH server 9.1 (CVE-2023-25136) 💚 seclists.org/oss-sec/2023/q…


pgt reposted

👏New tool from @g3rzi and @CyberArkLabs!👏 PipeViewer - A GUI tool for viewing Windows Named Pipes and searching for insecure permissions. github.com/cyberark/PipeV…


Loading...

Something went wrong.


Something went wrong.