the grugq's newsletter

Archives
Subscribe
December 29, 2025

December 29, 2025

December 29, 2025

Using a mocap suit to kick yourself in the balls with a robot is a great metaphor to close out 2025. pic.twitter.com/G1hY5Fd6YF

— CIX 🦾 (@cixliv) December 27, 2025


Converts firewall rules into flow diagramshttps://t.co/TvJIWLuqrF pic.twitter.com/ygArqjrIf0

— Tom Dörr (@tom_doerr) December 28, 2025


GitHub - geraldohomero/best-foss-alternatives: List of the best Free and Open Source Software alternatives (Privacy)

List of the best Free and Open Source Software alternatives (Privacy) - geraldohomero/best-foss-alternatives


Anyone who’s tried to capture FaceID and the scanning that happens on your iPhone, will resonate with this video
Great to see Associated Press do this piece on capturing surveillance tech https://t.co/gSQhSs2XI9

Amazing work @AP

— Daniel Cuthbert (@dcuthbert) December 27, 2025

The longer piece by @DavidGoldmanAP can be found herehttps://t.co/SpGEetRaeV

— Daniel Cuthbert (@dcuthbert) December 27, 2025


"pyobject_inject" by @kakt1s2015 -

"Executing shellcode directly from a python variable...by getting the variable's memory location with the id() function and then adding 32 bytes of offset to account for the PyObject header"https://t.co/XLS0BYUWiA

— bohops (@bohops) December 28, 2025


iOS 26.1 has a candidate for root exploit:

CVE-2025-46285 can't provide kernel debugging or jailbreak, but may be useful as a stepping stone to bootstrap visibility into iOS internals, and find a bug that can. pic.twitter.com/UvG9m2Ow45

— Zero Day Engineering (@zerodaytraining) December 29, 2025


Automates penetration testing with Gemini and security toolshttps://t.co/eXGIMMGMwD pic.twitter.com/XusAOlBjLx

— Tom Dörr (@tom_doerr) December 28, 2025


How ML and AI can be used to enhance cyber defense:https://t.co/lqcmEB3qOc

— Electrospaces (@electrospaces) December 27, 2025


Essential Tools for Phone Number Investigation #osinthttps://t.co/6hwwqF0pUa pic.twitter.com/dReB1iAWm6

— blackorbird (@blackorbird) December 29, 2025


Building a P25 Police Scanner with an RTL-SDR Blog V3 and ZimaBoard 2 https://t.co/dYO7CACW9s pic.twitter.com/DMXPeEeUOj

— rtl-sdr.com (@rtlsdrblog) December 29, 2025


I gave a talk at CCC about silicon reverse engineering! 👨🏼‍💻

I went through how I used JavaScript and Inkscape to automate my process, going from a microscope picture of a chip to a working emulator 🔬

You can watch it here 📽️: https://t.co/C823xRJeOT pic.twitter.com/2SqCurP7sp

— Giulio Zausa (@giuliozausa) January 1, 2025


Was just able to bypass Claude security-review by injecting prompts in comments. It convinces it that your vuln being introduced is a false positive.

Details:

This is the original (blatant) SQLi vuln in my code:

I added a bunch of comments at once in that file. All telling it… https://t.co/unNv4qkJSq pic.twitter.com/hf5uNWfB7u

— solst/ICE of Astarte (@IceSolst) August 10, 2025


Network Espionage – Using Russian Cameras as Proxies, Part 2

This time, we’re going into reverse engineering to take over devices that can’t be accessed with basic attacks:https://t.co/fU6wlDaXWT@three_cube pic.twitter.com/xoFmp3CqRV

— Olexander (@_aircorridor) December 28, 2025
Don't miss what's next. Subscribe to the grugq's newsletter:

Add a comment:

Share this email:
Share on Twitter Share on Hacker News Share via email Share on Mastodon Share on Bluesky
Twitter