ZeusBox

348 posts

ZeusBox banner
ZeusBox

ZeusBox

@Zeusb0x

Playing with Pandora's box. Sometimes it's better not to open it. Sometimes, it's better not to know.

Katılım Şubat 2018
348 Takip Edilen774 Takipçiler
ZeusBox
ZeusBox@Zeusb0x·
@ashtoncirillo Soon the collective west will have to deal with big waves of Ukrainian refugees. Winter is coming. The energy situation is not rosy. If Ukraine wouldn't have violated the international law this wouldn't have happened. They can anytime capitulate and end this mess now.
English
1
0
0
0
S. Ashton-Cirillo
S. Ashton-Cirillo@AshtonCirillo·
Holy shit. Russia hit Kharkiv's power grid. The entire city is out of power.
Ukraine 🇺🇦 English
109
368
1.4K
0
ZeusBox retweetledi
Dreg
Dreg@therealdreg·
Bochs its now in github github.com/bochs-emu/Bochs we will be glad to see your contribution, Looking for new devs :D
English
0
38
121
0
ZeusBox retweetledi
Theori
Theori@theori_io·
Our intern @_qwerty_po was destined to analyze a recent Linux kernel LPE vuln (CVE-2022-32250), a bug found and reported by @FidgetingBits. Here's a brief write-up on the analysis of the bug and the exploit development. Check it out! blog.theori.io/research/CVE-2… (exploit included)
English
2
101
243
0
ZeusBox retweetledi
I.Zhilyakov
I.Zhilyakov@m0br3v·
Backdoors in the system partition of budget Android device models target arbitrary code execution in the WhatsApp and WhatsApp Business messaging apps. Devices are counterfeit versions of famous brand-name models news.drweb.com/show/?i=14542&…
I.Zhilyakov tweet media
English
4
35
114
0
ZeusBox retweetledi
k0shl
k0shl@KeyZ3r0·
We @KunlunLab will share the vulnerability and exploitation I used in the TianfuCup2021 for escaping Adobe Reader sandbox on #BCS2022, this vulnerability existed in Named Pipe File System for nearly 10 years since AppContainer was born. We called it "Windows Dirty Pipe".(1/2)
English
10
58
265
0
ZeusBox
ZeusBox@Zeusb0x·
@bitfield It's like chess. Most people can think only a few moves ahead. The bright ones can see the whole game. If you need to hire such a person, leetcode is definitely useful.
English
2
0
1
0
John Arundel
John Arundel@bitfield·
LeetCode is a useless interviewing tool. Very few of our jobs are actually about finding an efficient algorithmic solution on the spot, with no support, and real life generally requires days of work on a design. Why are we using riddles to hire developers? fev.al/posts/leet-cod…
English
38
98
746
0
ZeusBox
ZeusBox@Zeusb0x·
@ejmalrai , not to mention a direction confrontation with the enemies. Look at the Kaliningrad blockade: they acted and then they backed up. The same with Kosovo, and the same will happen with Taiwan. They are thus acting only in the realm of tragic comedy.
English
2
0
2
0
Elijah J. Magnier 🇪🇺
The #US is opening fire on two superpower countries simultaneously: #Russia and #China. This is a strong indication that the US unilateral hegemony is heading towards the end, but we must acknowledge that Washington is the best contributor to its own decline.
English
69
244
1K
0
ZeusBox
ZeusBox@Zeusb0x·
@realadamqureshi @China2ASEAN The americans have announced their intention to grossly violate the international law. China can do whatever is necessary to protect it's sovereignty and territorial integrity.
English
9
1
59
0
ZeusBox
ZeusBox@Zeusb0x·
@NinjaParanoid I believe the guard pages are there to prevent you from reading/parsing the EAT. One can bypass that by walking backwards in memory and looking at page boundaries for the PE header of the main exe/dll. Inspect IAT recursively and use HellsGate to grab syscall id's dynamically.
English
1
1
3
0
ZeusBox
ZeusBox@Zeusb0x·
@mmolgtm Some of those with locked bootloaders will build you a statue for this.
English
0
0
1
0
Man Yue Mo
Man Yue Mo@mmolgtm·
This might be the best bug I found. Never thought I'd be writing a kernel exploit as reliable, clean and fast as a browser exploit. For a while I actually used this to root my research phone when can't be bothered to patch the rom: github.blog/2022-07-27-cor…
English
7
124
423
0