December 29, 2025
December 29, 2025
Using a mocap suit to kick yourself in the balls with a robot is a great metaphor to close out 2025. pic.twitter.com/G1hY5Fd6YF
— CIX 🦾 (@cixliv) December 27, 2025
Converts firewall rules into flow diagramshttps://t.co/TvJIWLuqrF pic.twitter.com/ygArqjrIf0
— Tom Dörr (@tom_doerr) December 28, 2025
GitHub - geraldohomero/best-foss-alternatives: List of the best Free and Open Source Software alternatives (Privacy)
List of the best Free and Open Source Software alternatives (Privacy) - geraldohomero/best-foss-alternatives
Anyone who’s tried to capture FaceID and the scanning that happens on your iPhone, will resonate with this video
— Daniel Cuthbert (@dcuthbert) December 27, 2025
Great to see Associated Press do this piece on capturing surveillance tech https://t.co/gSQhSs2XI9
Amazing work @AP
The longer piece by @DavidGoldmanAP can be found herehttps://t.co/SpGEetRaeV
— Daniel Cuthbert (@dcuthbert) December 27, 2025
"pyobject_inject" by @kakt1s2015 -
— bohops (@bohops) December 28, 2025
"Executing shellcode directly from a python variable...by getting the variable's memory location with the id() function and then adding 32 bytes of offset to account for the PyObject header"https://t.co/XLS0BYUWiA
iOS 26.1 has a candidate for root exploit:
— Zero Day Engineering (@zerodaytraining) December 29, 2025
CVE-2025-46285 can't provide kernel debugging or jailbreak, but may be useful as a stepping stone to bootstrap visibility into iOS internals, and find a bug that can. pic.twitter.com/UvG9m2Ow45
Automates penetration testing with Gemini and security toolshttps://t.co/eXGIMMGMwD pic.twitter.com/XusAOlBjLx
— Tom Dörr (@tom_doerr) December 28, 2025
How ML and AI can be used to enhance cyber defense:https://t.co/lqcmEB3qOc
— Electrospaces (@electrospaces) December 27, 2025
Essential Tools for Phone Number Investigation #osinthttps://t.co/6hwwqF0pUa pic.twitter.com/dReB1iAWm6
— blackorbird (@blackorbird) December 29, 2025
Building a P25 Police Scanner with an RTL-SDR Blog V3 and ZimaBoard 2 https://t.co/dYO7CACW9s pic.twitter.com/DMXPeEeUOj
— rtl-sdr.com (@rtlsdrblog) December 29, 2025
I gave a talk at CCC about silicon reverse engineering! 👨🏼💻
— Giulio Zausa (@giuliozausa) January 1, 2025
I went through how I used JavaScript and Inkscape to automate my process, going from a microscope picture of a chip to a working emulator 🔬
You can watch it here 📽️: https://t.co/C823xRJeOT pic.twitter.com/2SqCurP7sp
Was just able to bypass Claude security-review by injecting prompts in comments. It convinces it that your vuln being introduced is a false positive.
— solst/ICE of Astarte (@IceSolst) August 10, 2025
Details:
This is the original (blatant) SQLi vuln in my code:
I added a bunch of comments at once in that file. All telling it… https://t.co/unNv4qkJSq pic.twitter.com/hf5uNWfB7u
Network Espionage – Using Russian Cameras as Proxies, Part 2
— Olexander (@_aircorridor) December 28, 2025
This time, we’re going into reverse engineering to take over devices that can’t be accessed with basic attacks:https://t.co/fU6wlDaXWT@three_cube pic.twitter.com/xoFmp3CqRV
Add a comment: