fidgeting bits

1.3K posts

fidgeting bits banner
fidgeting bits

fidgeting bits

@FidgetingBits

voice coding nix junkie

Katılım Kasım 2014
1.4K Takip Edilen1.4K Takipçiler
fidgeting bits retweetledi
Anderson Nascimento
Anderson Nascimento@andersonc0d3·
Hey, I'm going to ask you something just in case. I teach a Linux kernel exploitation course and I wanted to differentiate to the class the kinds of randomizations we see in memory. Even without KASLR or any other configurable randomization, if you check a slub cache right after booting up, the slab base address is subject to some randomization, independent of the cache as far as I can tell. I spent some time investigating this and there's a point during the boot that there's no randomization, but it'll appear somehow. My guess is that some randomization will happen after the other processors are set up (maybe APIC is undeterministic). I even checked the first kmem caches being set up and kmalloc allocations. I didn't finish my analysis, and couldn't come up with a good hypothesis that could explain this behavior. Do you know anything about this? Thank you, and I've checked your book several times during my analysis.
English
4
2
7
1.2K
fidgeting bits retweetledi
BINARLY🔬
BINARLY🔬@binarly_io·
🚨More than a year after the XZ Utils crisis, we found 35+ publicly available Docker Hub images still carrying the backdoor, some tagged “latest”. Long-tail supply-chain risk is real! Read the blog: binarly.io/blog/persisten…
English
1
13
21
5.6K
fidgeting bits retweetledi
Anderson Nascimento
Anderson Nascimento@andersonc0d3·
[SECURITY] firefox-patch-bin, librewolf-fix-bin and zen-browser-patched-bin AUR packages contain malware @lists.archlinux.org/thread/7EZTJXLIAQLARQNTMEW2HBWZYE626IFJ/" target="_blank" rel="nofollow noopener">lists.archlinux.org/archives/list/…
English
0
2
1
706
fidgeting bits retweetledi
POC_Crew
POC_Crew@POC_Crew·
🧠 [POC2025] TRAINING Windows Kernel Exploitation: Becoming an "Advanced" Exploit Developer by Cedric Halbronn (@saidelike) 📅 Nov 10-12 (3 days) 📍 Four Seasons Hotel Seoul, South Korea 🔗 More info #training" target="_blank" rel="nofollow noopener">powerofcommunity.net/#training #POC2025
POC_Crew tweet media
English
1
3
37
8.5K
fidgeting bits retweetledi
Crusaders of Rust
Crusaders of Rust@cor_ctf·
🚨🚨🚨We just broke everyone’s favorite CTF PoW🚨🚨🚨 Our teammate managed to achieve a 20x SPEEDUP on kctf pow through AVX512 on Zen 5. Full details here: anemato.de/blog/kctf-vdf The Sloth VDF is dead😵 This is why kernelCTF no longer has PoW!
English
0
37
145
9.2K
fidgeting bits retweetledi
Man Yue Mo
Man Yue Mo@mmolgtm·
This might be the best bug I found. Never thought I'd be writing a kernel exploit as reliable, clean and fast as a browser exploit. For a while I actually used this to root my research phone when can't be bothered to patch the rom: github.blog/2022-07-27-cor…
English
7
124
423
0
fidgeting bits retweetledi
DARKNAVY
DARKNAVY@DarkNavyOrg·
Meet our new buddy, Argusee — an AI-powered, automated vulnerability hunter that has already discovered 15+ vulnerabilities across projects, including a previously unknown Linux kernel flaw (CVE-2025-37891) enabling LPE. Demo and details: darknavy.org/blog/argusee_a…
English
1
30
119
13K
fidgeting bits retweetledi
GrapheneOS
GrapheneOS@GrapheneOS·
We still need help getting early access to Android 16 sources prior to the stable release in June. Every mainstream Android OEM has it. We're currently spending significant time on reverse engineering Android 16 Beta releases. It's a huge waste compared to having what we need.
English
14
103
845
31.2K
fidgeting bits retweetledi
那个火饺🦆(JJ)
那个火饺🦆(JJ)@thatjiaozi·
I wanted to end last year with a vm escape, took me a bit longer but I want to present you my latest public research: A VM escape in Oracle VirtualBox using only one integer overflow bug! This was fixed in April 15 and assigned CVE-2025-30712. github.com/google/securit…
English
1
94
427
28.8K