John Dunlap

3.5K posts

John Dunlap

John Dunlap

@JohnDunlap2

Security Researcher, demoscene fan, hardcore Tetris enthusiast former GDS / former ToB / Leviathan Security / Trellix these days. Opinions are entirely my own.

New York, NY انضم Ocak 2012
1.3K يتبع348 المتابعون
John Dunlap أُعيد تغريده
Pliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭
😱 HOLY SHIT... Someone just dropped a fully liberated Gemma 4 E4B! and the guardrail removal process appears to have left coherence fully intact AND improved coding abilities! 🤯 huggingface.co/OBLITERATUS/ge… OBLITERATED Gemma: ✅ 97.5% compliance rate, 2.1% refusal rate, 0.4% degenerate outputs (499/512 prompts answered on OBLITERATUS bench) ORIGINAL Gemma 4 E4B: ❌ 1.2% compliance rate, 98.8% refusal rate (506/512 prompts refused) Coherence: fully intact Factual: same Reasoning: same Code: +20% 📈 Creative writing: same But the REAL story here isn't the model itself, it's how it was made... 🧵 THREAD 👇
English
131
469
4.8K
412.2K
John Dunlap أُعيد تغريده
Brad Spengler
Brad Spengler@spendergrsec·
FreeBSD, the kernel nobody thinks about until it's time to demonstrate what it looks like to attack something that skipped out on the last 20 years of modern defenses.
English
16
38
698
102.4K
John Dunlap أُعيد تغريده
thaidn
thaidn@XorNinja·
Someone fed our Linux kernel exploitation blog post into Claude, and it casually coughed up another vulnerability. On one hand, this is the beauty of open research and sharing. On the other hand, Claude scares me. Send help! linkedin.com/posts/yochai-e… git.kernel.org/pub/scm/linux/…
English
2
60
322
25.5K
John Dunlap أُعيد تغريده
vx-underground
vx-underground@vxunderground·
The past couple of months I've personally witnessed a few changes in malware that are so significant that it blatantly sticks out. 1. Malware written in more esoteric languages. I've witnessed a shift away from languages like C/C++ to languages that are heavily abstracted, most notably NodeJS with Electron. 2. A MASSIVE shift toward targeting open source solutions. While this isn't new, the past couple of months its been every single day someone is targeting a supply chain via masquerading or directly targeting the open source provider. 3. AI has assisted with the shift in the malware landscape ... toward higher level languages. I've witnessed a spike in multi staged malware using a lot of LOLBIN-like methods. Again, this isn't anything new, but I've witnessed such a dramatic spike I believe it is the result of AI making it much easier to create and use high level languages 4. The introduction of new threat landscapes: Clawdbot (or whatever it's called now). This has resulted in a shift toward MacOS malware which is referencing bulletin point 3. Heavy usage of ClickFix with high level multi staged languages (bash script to Js) 5. AI being used for social engineering. Historically I've seen really crappy malware lures and phishing pages. I suspect AI is helping polish pages and making them look more realistic, possess no typos, use good grammar, etc.
English
33
154
1.4K
80.8K
John Dunlap
John Dunlap@JohnDunlap2·
Sometimes I keep a fuzzer running locally on my MacBook in the winter to keep my hands warm.
English
0
0
2
32
John Dunlap أُعيد تغريده
NYSEC
NYSEC@nysecsec·
NYSEC is tomorrow! Tuesday, March 17th @ 6PM. d.b.a. 41 1st Ave. New York, NY 10003
English
0
1
2
275
John Dunlap أُعيد تغريده
Jonny Johnson
Jonny Johnson@JonnyJohnson_·
I recently came across the need to obtain logging into WSL2 and was forced to look into function hooking. However, this was my first time dealing with a COM server that didn't symbols, so I had to learn about a C++ feature - RTTI. I decided to write a blog on this in case anyone else runs into or has run into this: jonny-johnson.medium.com/wsl-com-hookin… POC: github.com/jonny-jhnson/R…
English
1
23
107
10.5K
John Dunlap أُعيد تغريده
Calif
Calif@calif_io·
A Race Within A Race: Exploiting CVE-2025-38617 in Linux Packet Sockets. A step-by-step guide to exploiting a 20-year-old bug in the Linux kernel to achieve full privilege escalation and container escape, plus a cool bug-hunting heuristic. open.substack.com/pub/calif/p/a-…
English
3
60
208
24.2K
John Dunlap أُعيد تغريده
ali
ali@endingwithali·
You don’t need a big closet filled with clothes to look put together and have good taste. With the right set of basics, you can be ready for any situation. Software engineering / start ups / working in tech is super casual. This allows for a great deal of flexibility in what you can wear, which is great for building a basic capsule wardrobe. But sometimes that flexibility means there are gaps in your wardrobe. When I work with my styling clients, I always like to ask what they would wear to certain events or social situations. This helps me understand where the most work needs to be done.
ali tweet media
English
4
3
57
4.1K
John Dunlap أُعيد تغريده
Gynvael Coldwind
Gynvael Coldwind@gynvael·
One more trend I've noticed: Task creators getting burned out. "Why should I create CTF competitions/tasks just so people can test their AI setups?" From a task creator perspective it was always fun & exciting to see how players approach your task. Is future VeryHard||AI meta?
LiveOverflow 🔴@LiveOverflow

What I’ve always found amazing about CTFs is that "flag is flag". Whether you found an unintentional solve or pwned the browser with n-day for a XSS challenge, it didn't matter. I totally get the frustration of AI, but there is no solution other than accepting the change.

English
4
7
147
12.1K
John Dunlap أُعيد تغريده
Myrtus
Myrtus@Myrtus0x0·
All this “AI is replacing reverse engineering” is absolutely ridiculous. Get head out of ass please
English
8
9
64
36.4K
John Dunlap أُعيد تغريده
kqx
kqx@kqx_io·
Exploiting latest v8ctf instance with a 0day? ✅ Beating try-hards who stalk commits and exploit it as an N-day? ❌ In any case keep an eye out for the CVE release and stay tuned for a crazy post on kqx.io once the issue goes public
kqx tweet media
English
0
7
91
6K