pwnderer1's profile picture.

Vulnmod

@pwnderer1

Pinned

I got sometime to write a basic x86 debugger. Why? Simply for the fun of ptrace. Features? 1. A dumb length based mutation fuzzer integrated into the debugger itself. 2. Execution trace display at any instance of debugging. Here's a peek into it. asciinema.org/a/Ue8KEpPZcoeH…

asciinema.org

untitled

Recorded by Cyb0rG


Vulnmod reposted

Look GCC, I don't think I'm being unreasonable here

lcamtuf's tweet image. Look GCC, I don't think I'm being unreasonable here

Vulnmod reposted

Some IDA MCP servers can be tricked into executing arbitrary code directly from the malware sample


Vulnmod reposted

Did you know that pressing CTRL+D in linux terminal is like pressing ENTER? (to some extent, of course) Well, I didn't, so after randomly investigating what CTRL+D actually does, I've decided it's a fun topic to write about: hackarcana.com/article/ctrl-d…


Always.

Normalize deleting a repo and re-cloning it on the first error. Don’t give in to git bullying.



Vulnmod reposted

you gotta appreciate the way they shipped the backdoored object file. added some "test" data to the source tree that gets unxz'd and (dd) carved in a specific way, that is fed into a deobfuscator written in.. awk script and the result gets unxz'd again

bl4sty's tweet image. you gotta appreciate the way they shipped the backdoored object file. added some "test" data to the source tree that gets unxz'd and (dd) carved in a specific way, that is fed into a deobfuscator written in.. awk script and the result gets unxz'd again

Security through obscurity :)

Kiddy - (linux) kernel identity spoofer github.com/milabs/kiddy Kiddy module performs runtime Linux kernel modification so its futher identification will give irrelevant result. Such modification serves the purpose of defeating kernel exploitation attempts as most of kernel…

andersonc0d3's tweet image. Kiddy - (linux) kernel identity spoofer
github.com/milabs/kiddy

Kiddy module performs runtime Linux kernel modification so its futher identification will give irrelevant result.

Such modification serves the purpose of defeating kernel exploitation attempts as most of kernel…
andersonc0d3's tweet image. Kiddy - (linux) kernel identity spoofer
github.com/milabs/kiddy

Kiddy module performs runtime Linux kernel modification so its futher identification will give irrelevant result.

Such modification serves the purpose of defeating kernel exploitation attempts as most of kernel…
andersonc0d3's tweet image. Kiddy - (linux) kernel identity spoofer
github.com/milabs/kiddy

Kiddy module performs runtime Linux kernel modification so its futher identification will give irrelevant result.

Such modification serves the purpose of defeating kernel exploitation attempts as most of kernel…
andersonc0d3's tweet image. Kiddy - (linux) kernel identity spoofer
github.com/milabs/kiddy

Kiddy module performs runtime Linux kernel modification so its futher identification will give irrelevant result.

Such modification serves the purpose of defeating kernel exploitation attempts as most of kernel…


Vulnmod reposted

Bugs from the 90s… we all know gets() should never be used. It even says so in the Linux man page. The compiler (gcc for this example) lets you. It does give you a warning though. But scanf* and %s is exactly the same unbounded buffer overflow. But no compiler warning.


Vulnmod reposted

Malware Hiding in PDFs : What You Need to Know : mcafee.com/blogs/other-bl…

binitamshah's tweet image. Malware Hiding in PDFs : What You Need to Know : mcafee.com/blogs/other-bl…
binitamshah's tweet image. Malware Hiding in PDFs : What You Need to Know : mcafee.com/blogs/other-bl…

Vulnmod reposted

Rust-based firmware is inherently secure by design. What could possibly go wrong?

matrosov's tweet image. Rust-based firmware is inherently secure by design. What could possibly go wrong?

Vulnmod reposted

when the bug only triggers once in a thousand executions

chompie1337's tweet image. when the bug only triggers once in a thousand executions

Vulnmod reposted

Apple today announced changes to increase attack surface apple.com/newsroom/2024/…

LiveOverflow's tweet image. Apple today announced changes to increase attack surface

apple.com/newsroom/2024/…

Vulnmod reposted

pretty sure nearly all the success of LLMs at vuln id is due to the benchmark datasets of past vulns. i gave gpt3.5 the vulnerable code from the GHOST writeup by @qualys and it gave the correct result, similar to the report . wow! then i renamed one of the variables "cool_guy"

alkalinesec's tweet image. pretty sure nearly all the success of LLMs at vuln id is due to the benchmark datasets of past vulns. 

i gave gpt3.5 the vulnerable code from the GHOST writeup by @qualys and it gave the correct result, similar to the report . wow!

then i renamed one of the variables "cool_guy"
alkalinesec's tweet image. pretty sure nearly all the success of LLMs at vuln id is due to the benchmark datasets of past vulns. 

i gave gpt3.5 the vulnerable code from the GHOST writeup by @qualys and it gave the correct result, similar to the report . wow!

then i renamed one of the variables "cool_guy"

Vulnmod reposted

My personal GPT for offensive security, SecGPT. Been working on it for a while now. I use it like i have a peer in a chair next to me, asking questions to learn and bounce ideas off of. Enjoy: chat.openai.com/g/g-HTsfg2w2z-…


Vulnmod reposted

To facilitate reverse-engineering of large programs, vulnerability research and root-cause analysis on iOS, Android, and other major platforms, @myr463 and @Hexabeast released Frinet, a tool combining Frida with an enhanced version of Tenet. synacktiv.com/publications/f…


Vulnmod reposted

New write-up on an Intel Ice Lake CPU vulnerability, we can effectively corrupt the RoB with redundant prefixes! 🔥 An updated microcode is available today for all affected products, cloud providers should patch ASAP. lock.cmpxchg8b.com/reptar.html


Vulnmod reposted

New Project Zero blogpost by Mark Brand - first mobile device ships with MTE (and how to enable it). "MTE on a production handset for the first time is a big step forward... there's real potential to use this technology to make 0-day harder". googleprojectzero.blogspot.com/2023/11/first-…


Vulnmod reposted

the fuzzer development process

hgarrereyn's tweet image. the fuzzer development process

Vulnmod reposted

I'm excited to announce a new decompilation control flow structuring algorithm, SAILR, which is the first to precisely revert compiler optimizations in decompilation. Find out how in our USENIX 2024 paper: zionbasque.com/files/publicat…. Code, info, and links in the 🧵

mahal0z's tweet image. I'm excited to announce a new decompilation control flow structuring algorithm, SAILR, which is the first to precisely revert compiler optimizations in decompilation. Find out how in our USENIX 2024 paper: zionbasque.com/files/publicat…. Code, info, and links in the 🧵

Loading...

Something went wrong.


Something went wrong.