maitai
@maitai.bsky.social
π€ 49
π₯ 225
π 3
BSc Computer Science Engineering | 24 | Trying to find my way ~ π
http://blig.one
reposted by
maitai
Iceman
4 months ago
π₯ The future of RFID hacking isnβt dead, its even more... At
#WHY2025
, Kirils and I are breaking down current RFID hacking situation No fluff. Just spilling the beans. ποΈ 9th of August 13:00 at Andromeda π
cfp.why2025.org/why2025/talk...
RT if youβre ready.
loading . . .
Decoding RFID: A comprehensive overview of security, attacks, and the latest innovations WHY2025
RFID reverse engineering has seen significant advancements, yet a comprehensive overview of the field remains scattered across research and practitioner communities. Here the authors presents a struc...
https://cfp.why2025.org/why2025/talk/MWLGZB/
0
7
7
reposted by
maitai
st98
7 months ago
ζη«γ§ε²‘ε±±ζ θ‘γ«θ‘γ£γ¦γγ θ²·γ£γ¦γγγγ³γ γγγγγγγ
0
2
1
reposted by
maitai
Lorenzo Leonardini
9 months ago
Took me a while, but here is the full article! If you want to see some weird URL parsing behavior, here you can find a lot of them :)
sec.leonardini.dev/blog/playing...
Disclaimer: no exploits nor vulnerabilities in this post, just some broken code
add a skeleton here at some point
1
8
2
reposted by
maitai
Nicolas GrΓ©goire
9 months ago
This article on Solr and its (in)security is really good π And I strongly recommend to read
@hacefresko.com
previous article on Solr before diving in this one (I will share the link in my reply)
add a skeleton here at some point
2
14
4
reposted by
maitai
KΓ©vin Gervot (Mizu)
9 months ago
For this challenge, it was necessary to abuse a discrepancy between the DOM and the rendered page in Firefox's cache handling π½ π
bugzilla.mozilla.org/show_bug.cgi...
This allows to shift iframe rendering from one to another leading to a sandbox bypass π₯ π
mizu.re/post/an-18-y...
add a skeleton here at some point
0
9
1
@hextreeio.bsky.social
π
9 months ago
0
0
0
reposted by
maitai
vx-underground (automated mirror)
9 months ago
Bro is writing malware but also a Mad Max supervillian
1
41
6
reposted by
maitai
Quarkslab
9 months ago
AMD published Security Bulletin AMD-SB-7027 addressing CVE-2024-0179 and CVE-2024-21925, the two UEFI SMM vulnerabilities disclosed in our blog post. Data center, desktop, mobile and embedded processors products are affected:
www.amd.com/en/resources...
add a skeleton here at some point
0
2
2
reposted by
maitai
GitHub Security Lab
9 months ago
Happy Friday folks! Here is a throwback to our 2nd most popular research post of 2024, "Gaining kernel code execution on an MTE-enabled Pixel 8" by Man yue Mo
github.blog/security/vul...
loading . . .
Gaining kernel code execution on an MTE-enabled Pixel 8
In this post, Iβll look at CVE-2023-6241, a vulnerability in the Arm Mali GPU that allows a malicious app to gain arbitrary kernel code execution and root on an Android phone. Iβll show how this vulne...
https://github.blog/security/vulnerability-research/gaining-kernel-code-execution-on-an-mte-enabled-pixel-8/
0
3
2
reposted by
maitai
David Buchanan
about 1 year ago
Can you get root with only a cigarette lighter? (Yes!)
www.da.vidbuchanan.co.uk/blog/dram-em...
16
391
90
reposted by
maitai
lcamtuf
10 months ago
I keep coming across all these "pseudocode" examples on Wikipedia and in academic papers, and what I don't understand is why the authors can't just learn a real programming language
13
78
8
Hype!
10 months ago
0
1
0
reposted by
maitai
smaury
12 months ago
If you are interested in client-side hacking and browser quirks I strongly recommend going through this writeup by
@maitai.bsky.social
! It was also cool to collab w/ him on the second chall π€πΏπ€π»
blig.one/2024/11/29/f...
loading . . .
Flatt Security XSS Challenge - Writeup | maitai's blog
https://blig.one/2024/11/29/flatt-xss-writeup.html
0
13
7
reposted by
maitai
PortSwigger Research
10 months ago
The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2024!
portswigger.net/research/top...
loading . . .
Top 10 web hacking techniques of 2024
Welcome to the Top 10 Web Hacking Techniques of 2024, the 18th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year
https://portswigger.net/research/top-10-web-hacking-techniques-of-2024
2
66
41
you reached the end!!
feeds!
log in