Every day, practical and advanced knowledge delivered straight to you.
Join now! 👇
Every day, practical and advanced knowledge delivered straight to you.
Join now! 👇
Every day, practical and advanced knowledge delivered straight to you.
Join now! 👇
Combines unsanitized username path traversal with pandas CSV to_csv() quirks to overwrite wsgi.py and gain RCE.
https://jineeshak.github.io/posts/Chaining-Directory-Traversal-and-CSV-Parser-Abuse-for-RCE-in-Django/
#django
Combines unsanitized username path traversal with pandas CSV to_csv() quirks to overwrite wsgi.py and gain RCE.
https://jineeshak.github.io/posts/Chaining-Directory-Traversal-and-CSV-Parser-Abuse-for-RCE-in-Django/
#django
Researcher adapts a Mali GPU integer overflow (CVE‑2023‑48409) to root Pixel 6 Pro by adding memory-spraying and SELinux bypasses—all from a single bug.
https://starlabs.sg/blog/2025/06-solo-a-pixel-6-pro-story-when-one-bug-is-all-you-need/
#Android
Researcher adapts a Mali GPU integer overflow (CVE‑2023‑48409) to root Pixel 6 Pro by adding memory-spraying and SELinux bypasses—all from a single bug.
https://starlabs.sg/blog/2025/06-solo-a-pixel-6-pro-story-when-one-bug-is-all-you-need/
#Android
A malicious app with zero permissions uses transparent animations to hide real system prompts (e.g., camera, location, admin) and trick users into tapping them unknowingly.
https://taptrap.click/
#Tapjacking #AndroidAttack
A malicious app with zero permissions uses transparent animations to hide real system prompts (e.g., camera, location, admin) and trick users into tapping them unknowingly.
https://taptrap.click/
#Tapjacking #AndroidAttack
GPUHammer is the first practical Rowhammer attack on GDDR6 VRAM (e.g., RTX A6000), flipping bits via CUDA and silently corrupting AI models, plummeting accuracy from ~80% to under 1%.
https://gpuhammer.com/
#Rowhammer #GPUAttacks
GPUHammer is the first practical Rowhammer attack on GDDR6 VRAM (e.g., RTX A6000), flipping bits via CUDA and silently corrupting AI models, plummeting accuracy from ~80% to under 1%.
https://gpuhammer.com/
#Rowhammer #GPUAttacks
A loader that achieves believable call stacks in reflectively loaded modules by parsing PE and registering unwind data via RtlAddFunctionTable.
https://maxdcb.github.io/DreamWalkers/
#ShellcodeLoader #CallStackSpoofing
A loader that achieves believable call stacks in reflectively loaded modules by parsing PE and registering unwind data via RtlAddFunctionTable.
https://maxdcb.github.io/DreamWalkers/
#ShellcodeLoader #CallStackSpoofing
Explains kernel pool allocation, PoolTags, segment heap (kLFH, VS, Large), and building a no‑admin tool to enumerate tags.
https://r0keb.github.io/posts/Windows-Kernel-Pool-Internals/
#Kernel #Heap #windows
Explains kernel pool allocation, PoolTags, segment heap (kLFH, VS, Large), and building a no‑admin tool to enumerate tags.
https://r0keb.github.io/posts/Windows-Kernel-Pool-Internals/
#Kernel #Heap #windows
Detailed guide on abusing unsecured WRMSR IOCTLs to overwrite LSTAR MSR, build ROP chains bypassing SMEP/SMAP/KPTI, and gain kernel execution.
https://idafchev.github.io/blog/wrmsr/
#Kernel #windows
Detailed guide on abusing unsecured WRMSR IOCTLs to overwrite LSTAR MSR, build ROP chains bypassing SMEP/SMAP/KPTI, and gain kernel execution.
https://idafchev.github.io/blog/wrmsr/
#Kernel #windows
SRLabs released the first open-source emulator-based fuzzing toolchain for Qualcomm Hexagon baseband firmware
https://www.srlabs.de/blog-post/hexagon-fuzz-full-system-emulated-fuzzing-of-qualcomm-basebands
#Baseband #Fuzzing
SRLabs released the first open-source emulator-based fuzzing toolchain for Qualcomm Hexagon baseband firmware
https://www.srlabs.de/blog-post/hexagon-fuzz-full-system-emulated-fuzzing-of-qualcomm-basebands
#Baseband #Fuzzing
A beginner in secure code review reintroduced CVE‑2014‑9495 by fuzzing width * bit-depth overflow
https://blog.himanshuanand.com/posts/discovered-a-libpng-vulnerability-11-years-after-it-was-patched/
#libpng #IntegerOverflow
A beginner in secure code review reintroduced CVE‑2014‑9495 by fuzzing width * bit-depth overflow
https://blog.himanshuanand.com/posts/discovered-a-libpng-vulnerability-11-years-after-it-was-patched/
#libpng #IntegerOverflow
Revived an expired .si tracker domain, launched Opentracker on VPS, and attracted ~1.7M torrents with 3.1M unique peers in just one hour.
https://kianbradley.com/2025/06/15/resurrecting-a-dead-tracker.html
#TorrentTracker
Revived an expired .si tracker domain, launched Opentracker on VPS, and attracted ~1.7M torrents with 3.1M unique peers in just one hour.
https://kianbradley.com/2025/06/15/resurrecting-a-dead-tracker.html
#TorrentTracker
Highlights using seccomp_user_notify with BPF for low‑overhead syscall interception, replacing slow ptrace—demoed via “copycat” tool for per‑syscall file redirection.
https://blog.mggross.com/intercepting-syscalls/
#Seccomp #SyscallInterceptor
Highlights using seccomp_user_notify with BPF for low‑overhead syscall interception, replacing slow ptrace—demoed via “copycat” tool for per‑syscall file redirection.
https://blog.mggross.com/intercepting-syscalls/
#Seccomp #SyscallInterceptor
Details setting up a VNC honeypot on Ubuntu that logs sessions, records attacker interactions, and captures payloads for monitoring.
https://ja.meswoolley.co.uk/vnc-honeypot/
#VNC #Honeypot
Details setting up a VNC honeypot on Ubuntu that logs sessions, records attacker interactions, and captures payloads for monitoring.
https://ja.meswoolley.co.uk/vnc-honeypot/
#VNC #Honeypot
A built-in Embedded USB Debug (EUD) interface since ~2018 allows SWD/JTAG access via USB, enabling kernel/U-Boot debugging without external tools.
https://www.linaro.org/blog/hidden-jtag-qualcomm-snapdragon-usb/
#Snapdragon
A built-in Embedded USB Debug (EUD) interface since ~2018 allows SWD/JTAG access via USB, enabling kernel/U-Boot debugging without external tools.
https://www.linaro.org/blog/hidden-jtag-qualcomm-snapdragon-usb/
#Snapdragon
A Golang webserver uses eBPF (XDP + kernel hashmap) to capture TCP SYN options at kernel-level and fingerprint clients efficiently.
https://halb.it/posts/ebpf-fingerprinting-1/
#eBPF #TCPFingerprinting
A Golang webserver uses eBPF (XDP + kernel hashmap) to capture TCP SYN options at kernel-level and fingerprint clients efficiently.
https://halb.it/posts/ebpf-fingerprinting-1/
#eBPF #TCPFingerprinting
Using GH Archive & GitHub Event API, Truffle’s tool scans zero‑commit force-pushes since 2020 to find leaked secrets.
https://trufflesecurity.com/blog/guest-post-how-i-scanned-all-of-github-s-oops-commits-for-leaked-secrets
#git
Using GH Archive & GitHub Event API, Truffle’s tool scans zero‑commit force-pushes since 2020 to find leaked secrets.
https://trufflesecurity.com/blog/guest-post-how-i-scanned-all-of-github-s-oops-commits-for-leaked-secrets
#git
A friendly primer on differentiable programming and neural nets—covering autodiff, CNNs, RNNs, transformers in PyTorch & JAX.
https://arxiv.org/abs/2404.17625
#NeuralNetwork
A friendly primer on differentiable programming and neural nets—covering autodiff, CNNs, RNNs, transformers in PyTorch & JAX.
https://arxiv.org/abs/2404.17625
#NeuralNetwork
Concise 45‑page guide covering C fundamentals: types, control flow, arrays, pointers, memory, struct, functions, and compilation.
http://cslibrary.stanford.edu/101/
#c #programming
Concise 45‑page guide covering C fundamentals: types, control flow, arrays, pointers, memory, struct, functions, and compilation.
http://cslibrary.stanford.edu/101/
#c #programming
Google’s TPUs use large systolic arrays, scratchpad memory, XLA AoT compilation, and 3D-torus interconnects to deliver exascale AI compute with efficiency.
https://henryhmko.github.io/posts/tpu/tpu.html
#tpu #firmware
Google’s TPUs use large systolic arrays, scratchpad memory, XLA AoT compilation, and 3D-torus interconnects to deliver exascale AI compute with efficiency.
https://henryhmko.github.io/posts/tpu/tpu.html
#tpu #firmware
Reverse‑engineered Worldline Yomani XR: found exposed serial console with root shell, bypassed tamper protections via hardware debug port.
https://stefan-gloor.ch/yomani-hack
#terminal
Reverse‑engineered Worldline Yomani XR: found exposed serial console with root shell, bypassed tamper protections via hardware debug port.
https://stefan-gloor.ch/yomani-hack
#terminal
Browser trick uses file upload to open File Explorer, copy malicious PowerShell path disguised as a doc, and auto-execute via address bar.
https://mrd0x.com/filefix-clickfix-alternative/
#Phishing
Browser trick uses file upload to open File Explorer, copy malicious PowerShell path disguised as a doc, and auto-execute via address bar.
https://mrd0x.com/filefix-clickfix-alternative/
#Phishing
Project creates reliable read/write/allocate primitives to evade telemetry by enabling custom injection flows and changing process IOCs.
https://trickster0.github.io/posts/Primitive-Injection/
#injection #evasion
Project creates reliable read/write/allocate primitives to evade telemetry by enabling custom injection flows and changing process IOCs.
https://trickster0.github.io/posts/Primitive-Injection/
#injection #evasion
PicoEMP is a budget Electromagnetic Fault Injection (EMFI) device using Raspberry Pi Pico, ideal for hobbyist security research.
https://github.com/newaetech/chipshouter-picoemp
#HardwareHacking
PicoEMP is a budget Electromagnetic Fault Injection (EMFI) device using Raspberry Pi Pico, ideal for hobbyist security research.
https://github.com/newaetech/chipshouter-picoemp
#HardwareHacking
NVISO explains how Conscrypt updates impacted HTTPS interception and how their AlwaysTrustUserCerts Magisk module now supports A7–A16.
https://blog.nviso.eu/2025/06/05/intercepting-traffic-on-android-with-mainline-and-conscrypt/
#android
NVISO explains how Conscrypt updates impacted HTTPS interception and how their AlwaysTrustUserCerts Magisk module now supports A7–A16.
https://blog.nviso.eu/2025/06/05/intercepting-traffic-on-android-with-mainline-and-conscrypt/
#android
Demonstrates EMFI and voltage glitching on ESP32‑V3 to modify flash CRC32 and combine glitch for Secure Boot bypass via complex fault‑injection chain.
https://security.humanativaspa.it/fault-injection-follow-the-white-rabbit/
#EMFI #SecureBootBypass
Demonstrates EMFI and voltage glitching on ESP32‑V3 to modify flash CRC32 and combine glitch for Secure Boot bypass via complex fault‑injection chain.
https://security.humanativaspa.it/fault-injection-follow-the-white-rabbit/
#EMFI #SecureBootBypass