August 9, 2025
August 9, 2025
That time when @tehjh was just reviewing a new Linux kernel feature, found a security vuln, then went on a journey to see if he could exploit it from inside the Chrome Linux Desktop renderer sandbox (spoiler: very yes)https://t.co/Atc6toEdAj
— Tim Willis (@itswillis) August 8, 2025
Documented instructions for setting up KGDB on Pixel 8.
— Andrey Konovalov (@andreyknvl) July 28, 2025
Including getting kernel log over UART via USB-Cereal, building/flashing custom kernel, breaking into KGDB via /proc/sysrq-trigger or by sending SysRq-G over serial, dealing with watchdogs, etc.https://t.co/vb4mgLDJrl
Trape: An OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time
— Dark Web Informer - Cyber Threat Intelligence (@DarkWebInformer) August 8, 2025
GitHub: https://t.co/gGbNHBK3zi pic.twitter.com/6JpO5jY7nl

Buttercup is now open-source! -The Trail of Bits Blog
Now that DARPA’s AI Cyber Challenge (AIxCC) has officially ended, we can finally make Buttercup, our CRS (Cyber Reasoning System), open source!
Team Shellphish came in 5th place in AIxCC! It took an incredible amount of work and 2 years of dedication from all of my amazing team members.
— Wil Gibbs (@cl4sm) August 8, 2025
Please check out our CRS ARTIPHISHELL Open Source now on GitHub!https://t.co/nEJSIkWn3O
Thanks to everyone who came out to see my talk! All of my code and the slides for my ChromeAlone presentation are available now at https://t.co/k1Paq232Mu. If you're interested in developing malicious browser extensions give the code a look! #defcon #chromealone #malware
— Michael Weber (@BouncyHat) August 8, 2025
What is Beaconator C2?
— Mike Manrod (@CroodSolutions) August 8, 2025
w/ @Shammahwoods introducing a C2 framework and set of adversarial emulation tools at @defcon demo labs to provide a robust management console with a wide range of beacon payloads, including payload options for win/MacOS/Linux.https://t.co/qIcRZc4uvV https://t.co/9JiCPuEoxw pic.twitter.com/T7SiHpCdkw
Ghosts in the Machine Check - Conjuring Hardware Failures to Breach CPU Privilege Boundaries by @xoreaxeaxeax https://t.co/yAsAXRNkjl pic.twitter.com/Q4yGeqXKv6
— Alex Plaskett (@alexjplaskett) August 8, 2025
Weekly summary is out...https://t.co/A4ar0NzvAG
— Ollie Whitehouse (@ollieatnowhere) August 8, 2025
The Secret History of Tor: How a Military Project Became a Lifeline for Privacy
