Edznux

1.4K posts

Edznux

Edznux

@Edznux

Katılım Ocak 2012
464 Takip Edilen114 Takipçiler
Edznux retweetledi
h0mbre
h0mbre@h0mbre_·
Wrote a blogpost today about getting Lucid fuzzing on a "real" target, all of the work that it took and the changes we made along the way. Next, we'll take a more earnest bug-finding approach and conduct a serious fuzzing campaign with Lucid: h0mbre.github.io/Lucid_Dreams_1/
English
1
42
197
23.3K
Edznux retweetledi
Disconnect3d
Disconnect3d@disconnect3d_pl·
We released new Pwndbg: github.com/pwndbg/pwndbg/… ! It brings new kernel commands for dumping heap allocator info, display of not taken branches (X marker) in disasm, better disasm for ARM/MIPS/LoongArch64, initial s390x support & more! Sponsor us at github.com/sponsors/pwndbg !
Disconnect3d tweet mediaDisconnect3d tweet mediaDisconnect3d tweet mediaDisconnect3d tweet media
English
16
68
297
21.8K
Edznux retweetledi
tmp.0ut
tmp.0ut@tmpout·
Would you look at that, it's tmp.0ut Volume 4! Happy Friday, hope you enjoy this latest issue! tmpout.sh/4/
tmp.0ut tweet media
English
10
217
549
72.6K
Edznux
Edznux@Edznux·
@_0xffd @LiveOverflow I first selected the targets by doing some AST traversal to find interesting candidates (in a large code base). Once you have that you are able to use the signature of the function directly and the results were few enough to use an "expensive" model. It was good enough to start
English
0
0
1
53
Aviad
Aviad@_0xffd·
@Edznux @LiveOverflow were u able to do something interesting with the context's semantics or just chop-chop into chunks and hope?
English
1
0
0
27
LiveOverflow 🔴
LiveOverflow 🔴@LiveOverflow·
Do you work in security and use LLMs for work?
English
2
3
17
8K
Edznux
Edznux@Edznux·
@LiveOverflow I voted for the basic chat but actually, i've a small script that creates basic fuzz test generation (in Go) based on the context of the codebase!
English
1
0
2
196
LiveOverflow 🔴
LiveOverflow 🔴@LiveOverflow·
If you are using scripts, or even custom agent, I would love to hear more about it. Please share what you are doing!
English
3
0
9
4.9K
Edznux retweetledi
Felix Geisendörfer
Felix Geisendörfer@felixge·
Manually instrumenting Go applications for observability has always been a time-consuming challenge. Solutions based on binary patching and eBPF have attempted to solve this, but they often come with undesirable tradeoffs. That’s why we built Orchestrion … 🧵
Felix Geisendörfer tweet media
English
5
23
144
30.3K
Edznux retweetledi
XBOW
XBOW@Xbow·
We are now making our validation benchmarks public! We invite you to test your skills or systems against them and share your results with us. Read more in our blog post: xbow.com/blog/benchmark…
English
0
9
53
19.1K
Edznux retweetledi
Casey Muratori
Casey Muratori@cmuratori·
After many weeks in development, my series on Zen, CUDA, and Tensor cores is ready to roll out. Up first is a look at the silicon - what does the physical layout of a Zen 4 or Ada Lovelace chip actually look like? computerenhance.com/p/zen-cuda-and…
English
15
70
600
31.2K
Edznux retweetledi
Phrack Zine
Phrack Zine@phrack·
The time has come, and with it your reading material for the week. Phrack #71 is officially released ONLINE! Let us know what you think! phrack.org/issues/71/1.ht…
Phrack Zine tweet media
English
15
491
1K
163.5K
Edznux retweetledi
Martin Kleppe
Martin Kleppe@aemkei·
Time for a new mind-bending project! #QLOCK — A JavaScript Quine Clock aem1k.com/qlock It displays the current time in a seven-segment style, embedded within its own JavaScript source code. 🕔 🕝 🕢 🕤 🕑 🕜 (321 bytes)
English
57
407
2.9K
338.6K
Edznux retweetledi
Matt Linton
Matt Linton@0xMatt·
PSA for Cybersecurity folk: Our co-workers are tired of being "tricked" by phishing exercises y'all, and it is making them hate us for no benefit. I have many thoughts that won't fit in a (non-bluecheck) tweet, so you can find them here: security.googleblog.com/2024/05/on-fir…
English
35
161
602
119.2K
Edznux
Edznux@Edznux·
@julesverne40942 We need to improve our doc around this for sure! In short, kubehound needs to be able to read nodes,pods,roles,clusterroles,rolesbinding,clusterrolebinding to see all the attack paths. It'll "fail" gracefully (as in, say the attack path graph will be incomplete) otherwise
English
1
0
0
20
jules verne
jules verne@julesverne40942·
@Edznux Hello, Thank you for your great tool ! i just don't see in documentation a good explanation about RBAC right that kubehound needs to scan cluster ? What are the granurality about that ?
English
1
0
0
15
Edznux retweetledi
h0mbre
h0mbre@h0mbre_·
starting a new fuzzer project on the blog that is based on an old @gamozolabs idea. in the first post, we load a statically built Bochs emulator ELF into our fuzzer process and execute it. there is some code and the humble beginnings of a repo. lets gooo h0mbre.github.io/New_Fuzzer_Pro…
English
6
102
347
82.3K
Edznux
Edznux@Edznux·
@hassoonycodes hey! I've started a PR for the documentation for this here github.com/DataDog/KubeHo… By using the "gremlinpython" package, you should be able to connect to the db and run that query as part of your python script
English
0
0
0
48
Edznux
Edznux@Edznux·
@GreyF1r3 @jeffmcjunkin you will have to run it from "somewhere" with read access on pods/nodes/roles/clusterroles! Nothing needs to be deployed alongside your services. If you don't have this kind of access easily for your user, you can (with some config) make a dump of this in a file and import it
English
0
0
3
52
Mike Ship
Mike Ship@cyberm1k3·
@Edznux @jeffmcjunkin Definitely not an expert here but didn’t see in the blog, or missed it, where this would be installed? With a sidecar container security stack?? Thanks in advance.
English
1
0
0
68