dotrandomcode.bsky.social
dotrandomcode.bsky.social
@dotrandomcode.bsky.social
Reposted by dotrandomcode.bsky.social
Just released a new malware analysis lab: Command & Control 3.

This lab tests provides an introduction to multi-stage malware loaders. Your job is to reverse engineer the command & control protocol, then write a script to retrieve the second stage payload. Inside you'll find the flag.
Command & Control 3 - Reverse Engineering Labs
Advanced malware often uses a droppers, which are small payloads designed to download the next stage of the malware from the C2. You'll have to reverse engineer the first stage to get the next.
malwaretech.com
October 18, 2025 at 11:46 PM
Reposted by dotrandomcode.bsky.social
The West has a blindspot when it comes to alternative CPU designs.



We’re so entrenched in the usual x86, ARM, RISC-V world, that most people have no idea what’s happening over in China.



LoongArch is a fully independent ISA that’s sorta MIPS…sorta RISC-V…and sorta x87!
August 19, 2025 at 8:44 PM
Reposted by dotrandomcode.bsky.social
Kinda wow: the mystery model "summit" (rumored to be OpenAI) with the prompt "create something I can paste into p5js that will startle me with its cleverness in creating something that invokes the control panel of a starship in the distant future" & "make it better"

2,351 lines of code. First time
July 27, 2025 at 3:10 AM
Reposted by dotrandomcode.bsky.social
We don’t need another engineer, we need a PM.

I was recently on a podcast w/ @marcmaiffret.bsky.social talking about how I ended up doing attribution work on MSFTs Zotob investigation in 2005 (if you just want to jump straight to the threat hunting bit, GOTO 31:55).

#adventuresofaliceandbob
Ep.78 - Champagne at 2AM: The International Zotob Takedown // Kymberlee… | 👑 Kymberlee Price
We don’t need another engineer, we need a PM. I teased that I was on a podcast with Marc Maiffret of BeyondTrust recently, and the episode is out now! In it I talk about my super-unusual path into ...
www.linkedin.com
May 18, 2025 at 8:32 PM
Reposted by dotrandomcode.bsky.social
I built a tool to help create these which lets you drop in the slide images, OCR the initial alt text and then edit the alt text and annotations

I wrote it with GPT-4 a couple of years ago, today I gave it a design refresh with Claude 3.7 Sonnet (thinking) simonwillison.net/2025/May/15/...
Annotated Presentation Creator
I've released a new version of my tool for creating annotated presentations. I use this to turn slides from my talks into [posts like this one](https://simonwillison.net/2025/May/15/building-on-llms/)...
simonwillison.net
May 15, 2025 at 2:45 PM
Reposted by dotrandomcode.bsky.social
Here's the full workshop handout plus annotated slides from "Building software on top of Large Language Models", a three hour tutorial I presented yesterday at PyCon US #PyConUS simonwillison.net/2025/May/15/...
Building software on top of Large Language Models
I presented a three hour workshop at PyCon US yesterday titled Building software on top of Large Language Models. The goal of the workshop was to give participants everything they …
simonwillison.net
May 15, 2025 at 12:29 PM
Reposted by dotrandomcode.bsky.social
Training and retention, not technology, are the main obstacles to military cyber readiness. warontherocks.com/20...
An Insider’s Guide to Cyber Readiness - War on the Rocks
Despite the Department of Defense spending $14 billion a year on cyber forces and technology, U.S. military cyber forces have never met the department’s
warontherocks.com
May 6, 2025 at 6:00 AM
Reposted by dotrandomcode.bsky.social
Very interesting oral history -- interviews with some top NLP folks on the effects of GenAI on their field:

www.quantamagazine.org/when-chatgpt...
When ChatGPT Broke an Entire Field: An Oral History | Quanta Magazine
Researchers in “natural language processing” tried to tame human language. Then came the transformer.
www.quantamagazine.org
May 1, 2025 at 2:44 AM
Reposted by dotrandomcode.bsky.social
lol
YOUR NL West leading San Francisco Giants just won on a Little League Home Run
April 28, 2025 at 12:06 AM
Reposted by dotrandomcode.bsky.social
Yall are beyond not ready about the shit we're cooking up with @censys.bsky.social and @greynoise.io powers combined

censys.com/blog/hunting...
Hunting Botnets With CursorAI, GreyNoise, Censys, and Censeye
Threat hunting is made easier and simpler by combining the power of Censys, GreyNoise, CursorAI, and Censeye.
censys.com
April 21, 2025 at 7:12 PM
Reposted by dotrandomcode.bsky.social
Truly an incredible accomplishment.
Getting beaten by 1Kb Chess. That hurts to this day (and remains an amazing programming feat). en.wikipedia.org/wiki/1K_ZX_C...
April 19, 2025 at 5:21 PM
Reposted by dotrandomcode.bsky.social
An Intro to DeepSeek's Distributed File System by maknee ?

3FS (Fire-Flyer File System) is a distributed filesystem released by DeepSeek during their open source release week. This blog post will dive into what distributed file systems are and how 3FS operates.

maknee.github.io/blog/2025/3F...
April 17, 2025 at 10:23 PM
Reposted by dotrandomcode.bsky.social
Wrote some notes on OpenAI codex, their new open CLI "agent" tool for writing and iterating on code. Since it's open source (Apache 2) the workings are available, including an interesting system prompt and a macOS sandbox using the sandbox-exec mechanism simonwillison.net/2025/Apr/16/...
April 16, 2025 at 10:10 PM
Reposted by dotrandomcode.bsky.social
Larger models can pull off a wider variety of feats, but the reduced footprint of smaller models makes them attractive tools. www.wired.com/story/why-re...
Small Language Models Are the New Rage, Researchers Say
Larger models can pull off a wider variety of feats, but the reduced footprint of smaller models makes them attractive tools.
www.wired.com
April 13, 2025 at 6:05 AM
Reposted by dotrandomcode.bsky.social
This shit is getting spooky. This is how far Kurt got without even writing tool prompts to tip Claude off on how best to use `flyctl`.

fly.io/blog/30-minu...
30 Minutes With MCP and flyctl
The robots wrote me a Fly Machine debugger.
fly.io
April 10, 2025 at 7:19 PM
Reposted by dotrandomcode.bsky.social
Graylog Labs latest blog covers the Tomcat RCE discovered last month to see how it ticks. Detection content free to download (regardless of your SIEM) in the blog
⚠️#CVE202524813 is a critical vulnerability affecting #ApacheTomcat. Learn how to detect exploits/attacks that target this vulnerability, using #Graylog.💡

Read on to see:
😈 How to emulate the adversary
🏃‍♂️ How to run the exploit
📋 Steps for a real attack
And more.

graylog.org/post/exploit...
Adversary Tradecraft: Apache Tomcat RCE
Learn how Graylog detects this RCE in Apache Tomcat (CVE-2025-24813). Emulation and setup is included in this blog.
graylog.org
April 8, 2025 at 1:56 AM
Reposted by dotrandomcode.bsky.social
v happy to finally share my slides for my @reconmtl.bsky.social 2024 talk “GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev.” Really proud of this talk + v grateful to the amazing REcon team for another incredible con 🖤
github.com/ic3qu33n/REc...
GitHub - ic3qu33n/REcon2024-GOP-Complex: REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""
REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev"" - ic3qu33n/REcon2024-GOP-Complex
github.com
March 31, 2025 at 8:51 PM
Reposted by dotrandomcode.bsky.social
🎥 DistrictCon Year 0 recordings are now live on YouTube! Check out the AMAZING content from our Track 1 Speakers, Junkyard competitors, and keynotes!
www.youtube.com/@DistrictCon
DistrictCon
DistrictCon is a DC hacker con, focusing on hacking together and exchanging ideas over typical talk tracks. We want to grow the community through action and engagement that focuses on the greater go...
www.youtube.com
April 2, 2025 at 6:40 PM
Reposted by dotrandomcode.bsky.social
I wrote up some more details about my visualization of NN training dynamics, but also what my mental model of NNs is:

addxorrol.blogspot.com/2025/04/some...

Bonus feature: Rich dynamics showing stability problems when training a very deep heavily overparametrized net, but no overfitting.
Some experiments to help me understand Neural Nets better, post 2 of N
In this post, I will explain my current thinking about neural networks. In a previous post I explained the intuition behind my "origami vie...
addxorrol.blogspot.com
April 5, 2025 at 2:43 PM
Reposted by dotrandomcode.bsky.social
Tinkering around for fun, a computer science undergrad realized that he had invented a new kind of hash table, one that worked faster than expected—taking less time and fewer steps to find specific elements.
Undergraduate Disproves 40-Year-Old Conjecture, Invents New Kind of Hash Table
A young computer scientist and two colleagues show that searches within data structures called hash tables can be much faster than previously deemed possible.
wrd.cm
March 22, 2025 at 5:44 PM
Reposted by dotrandomcode.bsky.social
The Power of Bug Bounty Automation with Nenad Zaric podcasters.spotify.c...
The Power of Bug Bounty Automation with Nenad Zaric by Phillip Wylie Show
About The Guest(s): Nenad Zarick is a cybersecurity expert and the founder of Trickest, a platform that automates offensive security workflows. With over 15 years of experience in the field, Nenad has a deep understanding of bug bounty programs and the importance of automation in cybersecurity. Summary: In this episode, Phillip interviews Nenad Zaric, the founder of Trickest, a platform that automates offensive security workflows. Nenad shares his background in cybersecurity and how he got started in bug bounty programs. He emphasizes the importance of automation in bug bounty and explains how Trickest can help bug hunters optimize their efforts. Nenad gives a live demo of the platform, showcasing its features and capabilities. He also discusses the scalability of the platform and the benefits of automation in the future of cybersecurity. Key Takeaways: Bug bounty hunters need to automate their workflows to be successful.Trickest allows users to easily automate offensive security workflows without the need for manual scripting.The platform integrates various tools and provides a visual interface for building workflows.Users can schedule workflows and execute them on multiple machines for scalability.Automation is the key to the future of cybersecurity and can save time and improve efficiency. Nenad's and Trickest's social media and website: https://twitter.com/ZaricNenad_ https://www.linkedin.com/in/nenad-zaric/ https://twitter.com/trick3st https://www.linkedin.com/company/trickest/ https://trickest.com/
podcasters.spotify.com
March 22, 2025 at 2:13 AM
Reposted by dotrandomcode.bsky.social
A16z's A Deep Dive Into MCP and the Future of AI Tooling

In this post, they’ll explore what MCP is, how it changes the way AI interacts with tools, what developers are already building with it, and the challenges that still need solving.

a16z.com/a-deep-dive-...
A Deep Dive Into MCP and the Future of AI Tooling | Andreessen Horowitz
We explore what MCP is, how it changes the way AI interacts with tools, what developers are already building, and the challenges that still need solving.
a16z.com
March 22, 2025 at 2:26 AM