Similar User
Sidu Ponnappa photo

@ponnappa

Eric Kimberling photo

@erickimberling

David H. Deans 🌐 photo

@dhdeans

Sylvère-Henry Cissé ⭐️ photo

@shcisse

WHU photo

@WHU_edu

Ray Deutschbein ⚓️ 🏄‍♂️🏎️ photo

@RayDeutschbein

Sumir Bhatia photo

@Sumir_bhatia

Warren photo

@warrenrunk

Scott Newland photo

@sanewland

Mark Conway photo

@MarkConwayUK

Sam Ogborn photo

@samogborn

Anand Sharma (आनंद) photo

@indrayam

Yogesh Gupta photo

@yogsyogi1

Crystal Diaz photo

@H1D3inPlainS1t3

Ludovic Piot photo

@lpiot

James Fraser Reposted

[Browser Exploitation] Insightful little analysis of v8 CVE-2024-7965: bi.zone/eng/expertise/… PoC: github.com/bi-zone/CVE-20… Logic bug in Turbofan's "sea of nodes" IR implementation allows for OOB array access! Exploit in-the-wild reported by Google & CISA on 26th August 2024


James Fraser Reposted

Just finished my talk about fuzzing EBPF at @BSidesCbr, and if anyone wants, they can find the slides here: canva.com/design/DAGQ09J… Big thanks to Bsides Canberra team for making it run smoothly!


James Fraser Reposted

The book is complete! (at least this first edition) leanpub.com/windowsnativea…


James Fraser Reposted

First part of chapter 11 has been published (security)! See how to call NtCreateToken :) Chapter 10 is not ready yet, I'll leave it for later. leanpub.com/windowsnativea…


James Fraser Reposted

Ali Hadi @binaryz0ne who was an OST1 instructor, reached out about contributing a class to #OST2. And when he learned about ost2.fyi/Sponsorship.ht… he said he wanted to Sponsor OST2 too! I look forward to seeing the DFIR material he’ll be creating, and appreciate the sponsorship!

Thanks to @cyber5w for Sponsoring #OST2 at the Bronze🥉 level! More about them here: cyber5w.com

Tweet Image 1


James Fraser Reposted

Hello World! Proudly announce the Supernova v2.0: - Obfuscation techniques: IPV4, IPv6, UUID, MAC - New languages: Java, Perl, PowerShell, Ruby - New chiphers: Chacha20 - Supports: raw shellcode output. - Code optimization - New arguments github.com/nickvourd/Supe…


James Fraser Reposted

I'm thrilled to announce that I'll be presenting a previously-unnamed vulnerability class at @BlueHatIL Oh, and I'll be dropping 0day. Be sure to stop by, learn something new, pwn the kernel, and have a coffee. It should be a good time. microsoftrnd.co.il/bluehatil/conf…

Tweet Image 1

James Fraser Reposted

The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the latest updates today.


James Fraser Reposted

20 8TB external harddrives. These will be cloned with 5.22TB of malware and mailed to nerds. Please pray for any inspector who decides to mount these on a Windows machine to inspect them 🙏

Tweet Image 1

James Fraser Reposted

Someone claims to have breached @vxunderground and is selling their password in underground forums

Tweet Image 1

James Fraser Reposted

New blog post up! In this one, I talk about some x86 trivia I learned while working on the CPU emulator for Time Travel Debugging. When writing an emulator, you have to REALLY know how things work to get it right. timdbg.com/posts/useless-…


James Fraser Reposted

"API Unhooking with Perun's Fart" #infosec #pentest #redteam dosxuz.gitlab.io/post/perunsfar…

Tweet Image 1
Tweet Image 2
Tweet Image 3

James Fraser Reposted

🦀📕 All chapters of my book, Rust Atomics and Locks, are now freely available online: marabos.nl/atomics/ Enjoy! ✨


James Fraser Reposted

If you're interested in Linux kernel exploitation. Read this fantastic 3-parts series by @_lkmidas Part 1: lkmidas.github.io/posts/20210123… Part 2: lkmidas.github.io/posts/20210128… Part 3: lkmidas.github.io/posts/20210205… #Linux #kernel #exploit #infosec #cybersecurity

Tweet Image 1
Tweet Image 2
Tweet Image 3

James Fraser Reposted

Two part series on attack surface of interpreted languages by @GHSecurityLab Part 1: securitylab.github.com/research/now-y… Part 2: securitylab.github.com/research/now-y… #infosec #cybersecurity #learning

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

James Fraser Reposted

[BLOG] Backdoor .NET applications via startup hooks. rastamouse.me/net-startup-ho…


James Fraser Reposted

I'm happy to release Venom - A C++ single header file for evasive network communication which using a stolen browser's socket to perform all of its network activities and by that can make it hard to trace it back to the process. github.com/Idov31/Venom #infosec #CyberSecurity


James Fraser Reposted

I regret to inform you that I made a thing. filippo.io/fakenews/


Loading...

Something went wrong.


Something went wrong.