xpldotjs reposted

I Built my own binary heap in pure C from scratch. I Implemented these features in this project : -Generic heap that stores void* elements -Custom comparator function (heap_cmp_fn) → supports min-heap or max-heap -heap_create() → create an empty heap -heap_build() → build a…

Abhishekcur's tweet image. I Built my own binary heap in pure C from scratch.

I Implemented these features in this project :
-Generic heap that stores void* elements
-Custom comparator function (heap_cmp_fn) → supports min-heap or max-heap
-heap_create() → create an empty heap
-heap_build() → build a…

xpldotjs reposted

This is my debut hour-long talk on exploiting a heap-overflow in Llama.cpp RPC, when I was fifteen at ZeroCon. Enjoy:) research.pwno.io/llama-paradox

retr0reg's tweet image. This is my debut hour-long talk on exploiting a heap-overflow in Llama.cpp RPC, when I was fifteen at ZeroCon. Enjoy:)

research.pwno.io/llama-paradox

xpldotjs reposted

Detecting Hypervisor-assisted Hooking TL;DR: This post will describe the concept of hypervisor-assisted hooking and a few simple approaches to detect such hooks. momo5502.com/posts/2022-05-…


xpldotjs reposted

Added a kernel driver to read arbitrary process memory (including Protected Process). Also implemented a functionality to query memory mapping information. github.com/daem0nc0re/Vec…

daem0nc0re's tweet image. Added a kernel driver to read arbitrary process memory (including Protected Process).
Also implemented a functionality to query memory mapping information.
github.com/daem0nc0re/Vec…
daem0nc0re's tweet image. Added a kernel driver to read arbitrary process memory (including Protected Process).
Also implemented a functionality to query memory mapping information.
github.com/daem0nc0re/Vec…
daem0nc0re's tweet image. Added a kernel driver to read arbitrary process memory (including Protected Process).
Also implemented a functionality to query memory mapping information.
github.com/daem0nc0re/Vec…
daem0nc0re's tweet image. Added a kernel driver to read arbitrary process memory (including Protected Process).
Also implemented a functionality to query memory mapping information.
github.com/daem0nc0re/Vec…

xpldotjs reposted

New research from @jdu2600: a clean loader-lock escape using the PEB's PostProcessInitRoutine. Read the analysis and PoC code 📃 preludesecurity.com/blog/escaping-…


xpldotjs reposted

Chained 6 vulnerabilities to get RCE on @UnitreeRobotics days ago. They pushed V1.1.11 a day later "patching" (not really) the RCE. The @pwnoio boys are unstoppable, new RCE using the same primitive. Crazy blog dropping soon 🔥🔥🔥 @retr0reg

olivier_boschko's tweet image. Chained 6 vulnerabilities to get RCE on @UnitreeRobotics days ago. They pushed V1.1.11 a day later "patching" (not really) the RCE. The @pwnoio boys are unstoppable, new RCE using the same primitive. Crazy blog dropping soon 🔥🔥🔥 @retr0reg
olivier_boschko's tweet image. Chained 6 vulnerabilities to get RCE on @UnitreeRobotics days ago. They pushed V1.1.11 a day later "patching" (not really) the RCE. The @pwnoio boys are unstoppable, new RCE using the same primitive. Crazy blog dropping soon 🔥🔥🔥 @retr0reg

xpldotjs reposted

[1day1line] CVE-2025-49844: RCE Vulnerability in Redis Caused by Use After Free via Lua Script hackyboiz.github.io/2025/10/29/new… Today's 1day1line: CVE-2025-49844, a Use After Free RCE vulnerability discovered in Redis. The vulnerability is caused by unpinned chunks accessed via Lua…


xpldotjs reposted

hyper-reV: A powerful memory introspection & reverse engineering hypervisor leveraging Hyper-V. Read/write guest memory, SLAT hooks, and hide pages, all while evading detection. Supports Intel/AMD, tested on Win10/11. Check it out: github.com/noahware/hyper… #HyperV


xpldotjs reposted

Blog post about my recent CVE-2025-58726, aka “The Ghost Reflection” is out, read it here: semperis.com/blog/exploitin… 🙃


xpldotjs reposted

Small update on "printerbugnew:" added a description of how to exploit CVE-2025-54918: DCs running 2025 allow reflection RPC->LDAPS - from a standard user to DA before patch😃 github.com/decoder-it/pri…


xpldotjs reposted

Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. github.com/Shac0x/Wonka


xpldotjs reposted

Today I am releasing a new blog post on VSM "secure calls" + the SkBridge project to manually issue them!! This blog talks about how VTL 0 requests the services of VTL 1 and outlines common secure call patterns!!! Blog: connormcgarr.github.io/secure-calls-a… SkBridge: github.com/connormcgarr/S…

33y0re's tweet image. Today I am releasing a new blog post on VSM "secure calls" + the SkBridge project to manually issue them!!

This blog talks about how VTL 0 requests the services of VTL 1 and outlines common secure call patterns!!!

Blog: connormcgarr.github.io/secure-calls-a…

SkBridge: github.com/connormcgarr/S…

xpldotjs reposted

Excellent crash course from Raphael Mudge on PIC shellcode development vimeo.com/1100089433

C2IRIS's tweet card. PIC Development Crash Course

vimeo.com

Vimeo

PIC Development Crash Course


xpldotjs reposted

Interested in an alternative approach to sleep masking for you malware? Check-out our latest blog post "Function Peekaboo: Crafting self masking functions using LLVM" by @saab_sec mdsec.co.uk/2025/10/functi…

MDSecLabs's tweet image. Interested in an alternative approach to sleep masking for you malware? Check-out our latest blog post "Function Peekaboo: Crafting self masking functions using LLVM" by @saab_sec mdsec.co.uk/2025/10/functi…

xpldotjs reposted

📚 AD Domain-Join Owning PoC Compromising the Active Directory through domain-join account attacks in 2025. Read: shelltrail.com/research/activ…

IntCyberDigest's tweet image. 📚 AD Domain-Join Owning PoC  

Compromising the Active Directory through domain-join account attacks in 2025. 

Read: shelltrail.com/research/activ…

xpldotjs reposted

👑 Writing To Memory From Kernel Mode Go beyond user-land. Learn to use the powerful MmCopyVirtualMemory function to safely read and write to memory from the highest privilege level, bypassing security checks and defenses. 🚀 Master Kernel-level Hacking: youtu.be/EaxaQYESDlM


Loading...

Something went wrong.


Something went wrong.