Community chat: https://t.me/hamster_kombat_chat_2
Twitter: x.com/hamster_kombat
YouTube: https://www.youtube.com/@HamsterKombat_Official
Bot: https://t.me/hamster_kombat_bot
Game: https://t.me/hamster_kombat_bot/
Last updated 3 months, 1 week ago
Your easy, fun crypto trading app for buying and trading any crypto on the market
Last updated 3 months ago
Turn your endless taps into a financial tool.
Join @tapswap_bot
Collaboration - @taping_Guru
Last updated 4 days, 5 hours ago
Reverse Engineering for Noobs Part 1 #Introduction #ReverseEngineering https://x86re.com/1.html
[Math] Cracking Wi-Fi password using combinatorics #CrackingWiFiPassword #Combinatorics #Aircrack #PythonCode #ShortPasswords https://yurichev.com/n/wifi_comb/
Heap overflow in JPEG loading in Samsung's Little Kernel bootloader (allows execution of persistent arbitrary code -- it survives reboots and factory reset) https://www.sstic.org/media/SSTIC2024/SSTIC-actes/when_vendor1_meets_vendor2_the_story_of_a_small_bu/SSTIC2024-Slides-when_vendor1_meets_vendor2_the_story_of_a_small_bug_chain-rossi-bellom_neveu.pdf
Writing a system call tracer using eBPF #eBPF #SystemCallTracer #LowLevelProgramming #Linux #CProgramming https://sh4dy.com/2024/08/03/beetracer/
sh4dy's blog
Writing a system call tracer using eBPF
Pre-RequisitesSystem calls, eBPF, C, basics of low-level programming. IntroductioneBPF (Extended Berkeley Packet Filter) is a technology that allows users to run custom programs within the kernel. BPF
Let’s Go into the rabbit hole (part 2) — the challenges of dynamically hooking Golang programs #GolangDynamicHooking #RuntimeHooking #ForeignFunctionInterface #CGO #QuarkslabBlog https://blog.quarkslab.com/lets-go-into-the-rabbit-hole-part-2-the-challenges-of-dynamically-hooking-golang-program.html
Quarkslab's blog
Let’s Go into the rabbit hole (part 2) — the challenges of dynamically hooking Golang programs
Golang is the most used programming language for developing cloud technologies. Tools such as Kubernetes, Docker, Containerd and gVisor are written in Go. Despite the fact that the code of these programs is open source, there is no way to analyze and extend…
Pumping Iron on the Musl Heap – Real World CVE-2022-24834 Exploitation on an Alpine mallocng Heap #NCCGroup #RealWorldCVE #SecurityResearch #ThreatAdvisory https://research.nccgroup.com/2024/06/11/pumping-iron-on-the-musl-heap-real-world-cve-2022-24834-exploitation-on-an-alpine-mallocng-heap/
Double Dipping Cheat Developer Gets Caught Red-Handed #Developer #Cheating #InformationSecurity #CyberArk #DoubleDipping https://www.cyberark.com/resources/threat-research-blog/double-dipping-cheat-developer-gets-caught-red-handed
Cyberark
Double Dipping Cheat Developer Gets Caught Red-Handed
Following our post “A Brief History of Game Cheating,” it’s safe to say that cheats, no matter how lucrative or premium they might look, always carry a degree of danger. Today’s story revolves...
Abusing RCU callbacks with a Use-After-Free read to defeat KASLR #UseAfterFree #AbusingRCUcallbacks #DefeatingKASLR #AnatomicalPrecision #LeakingAddresses https://anatomic.rip/abusing_rcu_callbacks_to_defeat_kaslr/
a place of anatomical precision
Abusing RCU callbacks with a Use-After-Free read to defeat KASLR
Introduction In this article, I will be walking you through a clever technique that can be used to leak addresses and defeat KASLR in the Linux Kernel when you have a certain type of Use-After-Free by abusing RCU callbacks. It is by no means a novel technique…
Pwntools 102 - Crafting Shellcode with Shellcraft #Shellcraft #Pwntools #CTF #ReverseEngineering #ShellcodeCrafting https://www.archcloudlabs.com/projects/pwntools-shellcraft/
Arch Cloud Labs
Pwntools 102 - Crafting Shellcode with Shellcraft
About The Project Following up from Arch Cloud Labs’ previous blog post on Pwntools, we’ll continue to explore the pwntools framework this time focusing on shellcode generation. It’s not uncommon in the world of pwn/reverse engineering challenges for a requirement…
Community chat: https://t.me/hamster_kombat_chat_2
Twitter: x.com/hamster_kombat
YouTube: https://www.youtube.com/@HamsterKombat_Official
Bot: https://t.me/hamster_kombat_bot
Game: https://t.me/hamster_kombat_bot/
Last updated 3 months, 1 week ago
Your easy, fun crypto trading app for buying and trading any crypto on the market
Last updated 3 months ago
Turn your endless taps into a financial tool.
Join @tapswap_bot
Collaboration - @taping_Guru
Last updated 4 days, 5 hours ago