infosex.exchange <3

You are probably looking for the infosec.exchange Mastodon instance

This host is mostly for my random stuff, and in little part acts like a well-intentioned placeholder for the typosquatted domain.

Discoverability and Archiving

Currently I'm using this host for saving the items from my own feeds to the Wayback Machine and provide in-links for search engines. I hate that I have to do this, but the non-sense ideology of Mastodon pretty much ruined the search feature for Fediverse as a whole, and this wasn't changed by the fact that they owned their mistake and implemented search eventually.

Yes, I (or anyone else) could do similar things with other peoples published feeds, regardless of the tantrum. No, you can't defederate this, because the process doesn't rely on an instance.

Gluttony Section for Search Engines

@drwhax @cR0w @g0rb For some time now: https://www.knowledgeboat.com/question/what-was-known-as-a-letter-of-indulgence--321864213375743200
this post | permalink
@sassdawe That is the path to enlightment
this post | permalink
[RSS] Announcing Pwn2Own Berlin and Introducing an AI Category

https://www.thezdi.com/blog/2025/2/24/announcing-pwn2own-berlin-2025

P2O will be at OffensiveCon :O Also, AI pwn means RCE (as it should be)
this post | permalink
[RSS] Learn Assembly the FFmpeg Way

https://hackaday.com/2025/02/23/learn-assembly-the-ffmpeg-way/
this post | permalink
@sassdawe Defender usually chokes IO. Are you sure you get up-to-date results (considering you can't use the system otherwise, perf/GUI updates may be late too)?
this post | permalink
[RSS] Linux Kernel Some Vsock Vulnerabilities Analysis

https://u1f383.github.io/linux/2025/02/24/linux-kernel-some-vsock-vulnerabilities-analysis.html

Analysis of CVE-2025-21669, CVE-2025-21670 and CVE-2025-21666
this post | permalink
How have I not heard about https://wtrace.net before?!

#ReverseEngineering #Windows
this post | permalink
[RSS] Exploiting LibreOffice (CVE-2024-12425 and CVE-2024-12426)

https://codeanlabs.com/blog/research/exploiting-libreoffice-cve-2024-12425-and-cve-2024-12426/
this post | permalink
My RSS notified me about this interesting #ReverseEngineering tool, but when I opened the repo
- It included a README and a **.zip**
- The URL was written like this: https:\\www.exetools[.]net (surprisingly, it did even work in my browser!)

Absolutely barbaric!
this post | permalink
@noctivius "get some practice with using tools and memorizing commands" - Spot on! IME people who "grew up" with these labs are too much focused on these skills, while this is the easy part of the job. The hard part is to find where to dig.
this post | permalink
Next Page