buherator
@buherator.bsky.social
470 followers 250 following 2.5K posts
"I'm interested in all kinds of astronomy." https://scrapco.de Mostly cross-posting from Fediverse: @[email protected]
Posts Media Videos Starter Packs
[RSS] Denial of Fuzzing: Rust in the Windows kernel


research.checkpoint.com ->


Original->
"Which of course makes perfect sense when you are in the business of breaking stuff so people have to pay you for fixing it."

This is an old article, but this one sentence explains so many things!


dzone.com ->


Original->
(fair warning: if you are a JSF author, you better not come to punching distance of me)


Original->
[RSS] exploits.club Weekly Newsletter 89 - iOS GPU Driver Bugs, Kernel Stack UAFs, Hardware Wallet Auth Bypasses, and More


blog.exploits.club ->


Original->
[RSS] I remember taking a screen shot of a video, and when I opened it in Paint, the video was playing in it! What witchcraft is this?


devblogs.microsoft.com ->


Original->
Windows ARM64 Internals: Deconstructing Pointer Authentication | Prelude

www.preludesecurity.com ->


Original->
Depicting an iOS Vulnerability – DFSEC Research

blog.dfsec.com ->


Original->
FTR: today's star of the show is #F5


Original->
Reposted by buherator
🚨 Save the Date for #offensivecon26

Mark your calendars, spread the word, and stay tuned for when registrations open!

📍 Hilton Berlin
🧠 Trainings: 11–14 May 2026
🎤 Conference: 15–16 May 2026

Visit 🔗offensivecon.org for more details.
[RSS] Lucid Dreams II: Harness Development


h0mbre.github.io ->

#fuzzing


Original->
I'm really curious how libtiff is embedded in Windows so that CVE-2016-9535 could apparently lead to RCE in 2025


msrc.microsoft.com ->


Original->
Stats:
- Rewrite done in 45 mins (incl. coffee)
- LoC 200 -> 110
- Complexity ~halved (two-pass -> single-pass processing)
- I actually know what the code does


Original->
less than a year ago and came to the decision of reading the F manual and write that 200 LoC myself.

(to be fair, I think this would work if the LLM had access to a complier and runtime)
2/2

Original->
I think it was @david_chisnall who pointed out earlier that coding LLM's will become much less useful when we stop doing (expensive) training to keep up with breaking changes in API's.

Well, I just spent two hours trying to fix some code that was buggy because the API changed
1/2
[RSS] The October 2025 Security Update Review [by ZDI]


www.thezdi.com ->


Original->
Give this guy a Nobel Prize (any field would do)


www.youtube.com ->


Original->
[RSS] Oops! It's a kernel stack use-after-free: Exploiting NVIDIA's GPU Linux drivers


blog.quarkslab.com ->


Original->
Modern iOS Security Features – A Deep Dive into SPTM, TXM, and Exclaves


arxiv.org ->

#fromTwitter


Original->
[RSS] Securing the Future: Changes to Internet Explorer Mode in Microsoft Edge


microsoftedge.github.io ->


Original->
[RSS] Hacking the Nokia Beacon 1 Router: UART, Command Injection, and Password Generation with Qiling


spaceraccoon.dev ->


Original->
[RSS] In-depth analysis and deobfuscation of Zelix KlassMaster's flow obfuscation


github.com ->


Original->
[RSS] Reverse Engineering Denuvo in Hogwarts Legacy


momo5502.com ->


Original->