the grugq's newsletter

Subscribe
Archives
August 9, 2025

August 9, 2025

August 9, 2025

That time when @tehjh was just reviewing a new Linux kernel feature, found a security vuln, then went on a journey to see if he could exploit it from inside the Chrome Linux Desktop renderer sandbox (spoiler: very yes)https://t.co/Atc6toEdAj

— Tim Willis (@itswillis) August 8, 2025


Documented instructions for setting up KGDB on Pixel 8.

Including getting kernel log over UART via USB-Cereal, building/flashing custom kernel, breaking into KGDB via /proc/sysrq-trigger or by sending SysRq-G over serial, dealing with watchdogs, etc.https://t.co/vb4mgLDJrl

— Andrey Konovalov (@andreyknvl) July 28, 2025


Trape: An OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time

GitHub: https://t.co/gGbNHBK3zi pic.twitter.com/6JpO5jY7nl

— Dark Web Informer - Cyber Threat Intelligence (@DarkWebInformer) August 8, 2025


Buttercup is now open-source! -The Trail of Bits Blog

Now that DARPA’s AI Cyber Challenge (AIxCC) has officially ended, we can finally make Buttercup, our CRS (Cyber Reasoning System), open source!


Team Shellphish came in 5th place in AIxCC! It took an incredible amount of work and 2 years of dedication from all of my amazing team members.

Please check out our CRS ARTIPHISHELL Open Source now on GitHub!https://t.co/nEJSIkWn3O

— Wil Gibbs (@cl4sm) August 8, 2025


Thanks to everyone who came out to see my talk! All of my code and the slides for my ChromeAlone presentation are available now at https://t.co/k1Paq232Mu. If you're interested in developing malicious browser extensions give the code a look! #defcon #chromealone #malware

— Michael Weber (@BouncyHat) August 8, 2025

What is Beaconator C2?

w/ @Shammahwoods introducing a C2 framework and set of adversarial emulation tools at @defcon demo labs to provide a robust management console with a wide range of beacon payloads, including payload options for win/MacOS/Linux.https://t.co/qIcRZc4uvV https://t.co/9JiCPuEoxw pic.twitter.com/T7SiHpCdkw

— Mike Manrod (@CroodSolutions) August 8, 2025


Ghosts in the Machine Check - Conjuring Hardware Failures to Breach CPU Privilege Boundaries by @xoreaxeaxeax https://t.co/yAsAXRNkjl pic.twitter.com/Q4yGeqXKv6

— Alex Plaskett (@alexjplaskett) August 8, 2025


Weekly summary is out...https://t.co/A4ar0NzvAG

— Ollie Whitehouse (@ollieatnowhere) August 8, 2025


The Secret History of Tor: How a Military Project Became a Lifeline for Privacy

The Secret History of Tor: How a Military Project Became a Lifeline for Privacy | The MIT Press Reader

A story of secrecy, resistance, and the fight for digital freedom.


Don't miss what's next. Subscribe to the grugq's newsletter:
Start the conversation:
X