buherator
@buherator.bsky.social
470 followers 250 following 2.5K posts
"I'm interested in all kinds of astronomy." https://scrapco.de Mostly cross-posting from Fediverse: @[email protected]
Posts Media Videos Starter Packs
buherator.bsky.social
[RSS] I remember taking a screen shot of a video, and when I opened it in Paint, the video was playing in it! What witchcraft is this?


devblogs.microsoft.com ->


Original->
buherator.bsky.social
Windows ARM64 Internals: Deconstructing Pointer Authentication | Prelude

www.preludesecurity.com ->


Original->
buherator.bsky.social
Depicting an iOS Vulnerability – DFSEC Research

blog.dfsec.com ->


Original->
buherator.bsky.social
FTR: today's star of the show is #F5


Original->
Reposted by buherator
offensivecon.bsky.social
🚨 Save the Date for #offensivecon26

Mark your calendars, spread the word, and stay tuned for when registrations open!

📍 Hilton Berlin
🧠 Trainings: 11–14 May 2026
🎤 Conference: 15–16 May 2026

Visit 🔗offensivecon.org for more details.
buherator.bsky.social
[RSS] Lucid Dreams II: Harness Development


h0mbre.github.io ->

#fuzzing


Original->
buherator.bsky.social
I'm really curious how libtiff is embedded in Windows so that CVE-2016-9535 could apparently lead to RCE in 2025


msrc.microsoft.com ->


Original->
buherator.bsky.social
Stats:
- Rewrite done in 45 mins (incl. coffee)
- LoC 200 -> 110
- Complexity ~halved (two-pass -> single-pass processing)
- I actually know what the code does


Original->
buherator.bsky.social
less than a year ago and came to the decision of reading the F manual and write that 200 LoC myself.

(to be fair, I think this would work if the LLM had access to a complier and runtime)
2/2

Original->
buherator.bsky.social
I think it was @david_chisnall who pointed out earlier that coding LLM's will become much less useful when we stop doing (expensive) training to keep up with breaking changes in API's.

Well, I just spent two hours trying to fix some code that was buggy because the API changed
1/2
buherator.bsky.social
[RSS] The October 2025 Security Update Review [by ZDI]


www.thezdi.com ->


Original->
buherator.bsky.social
Give this guy a Nobel Prize (any field would do)


www.youtube.com ->


Original->
buherator.bsky.social
[RSS] Oops! It's a kernel stack use-after-free: Exploiting NVIDIA's GPU Linux drivers


blog.quarkslab.com ->


Original->
buherator.bsky.social
Modern iOS Security Features – A Deep Dive into SPTM, TXM, and Exclaves


arxiv.org ->

#fromTwitter


Original->
buherator.bsky.social
[RSS] Securing the Future: Changes to Internet Explorer Mode in Microsoft Edge


microsoftedge.github.io ->


Original->
buherator.bsky.social
[RSS] Hacking the Nokia Beacon 1 Router: UART, Command Injection, and Password Generation with Qiling


spaceraccoon.dev ->


Original->
buherator.bsky.social
[RSS] In-depth analysis and deobfuscation of Zelix KlassMaster's flow obfuscation


github.com ->


Original->
buherator.bsky.social
[RSS] Reverse Engineering Denuvo in Hogwarts Legacy


momo5502.com ->


Original->
buherator.bsky.social
[RSS] Analyzing and Breaking Defender for Endpoint's Cloud Communication


labs.infoguard.ch ->


Original->
buherator.bsky.social
I'm struggling to find and "ELI5 LLM" video, everything I get is either AI generated, marketing, or explaining advanced topics.

Any recommendations?

"You know, I couldn't do it. I couldn't reduce it to the freshman level. That means we really don't understand it." - Richard
1/2
buherator.bsky.social
The Great Software Quality Collapse: How We Normalized Catastrophe


techtrenches.substack.com ->

"We've normalized software catastrophes to the point where a Calculator leaking 32GB of RAM barely makes the news."


Original->
buherator.bsky.social
And they say school material is disconnected from real life:

I just had to use one of my password cracking wordlists to figure out kiddos homework


Original->