the grugq's newsletter

Subscribe
Archives
February 5, 2025

February 5, 2025

February 5, 2025

0x08 - Modern Windows Kernel Race Conditions : https://t.co/Wz1M7jlZ22

0x07 - Introduction to Windows Kernel Race Conditions : https://t.co/llNmYZiYFr

0x06 - Approaching Modern Windows Kernel Type Confusions : https://t.co/boHBcXYVub

0x05 - Introduction to Windows Kernel…

— Binni Shah (@binitamshah) February 4, 2025


I’m very excited to announce that we at V8 Security have finally published our first version of Fuzzilli that understands Wasm!
Go check it out at https://t.co/KP9ik5vDHm.
While we still have a way to go in improving it, we think it shows a promising approach!

— Carl Smith (@cffsmith) February 4, 2025


Bypass Linux kernel isolation technique using BPF infrastructurehttps://t.co/McFKINejmf#Linux #cybersecurity pic.twitter.com/alqzPK6GAr

— 0xor0ne (@0xor0ne) February 4, 2025


🔍 New Blog Post: "Linux Detection Engineering - A Continuation on Persistence Mechanisms"🐧

Topics covered:

🔹 LD_PRELOAD hijacking
🔹 Loadable Kernel Modules
🔹 Web Shells
🔹 System account manipulation

🔗PANIX: https://t.co/ohTz7xkdoh
📖Blog: https://t.co/K7Ea0GqD5r

— Ruben Groenewoud (@RFGroenewoud) February 4, 2025


The results are in! We're proud to announce the Top ten web hacking techniques of 2024! https://t.co/XHPEeqPQLR

— PortSwigger Research (@PortSwiggerRes) February 4, 2025


🚨 New threat: BADBOX botnet targets both off-brand and major Android devices, potentially with pre-installed malware. Over 190k infected, including high-end Yandex TVs. Learn how a suspicious SSL cert led to uncovering its infrastructure. https://t.co/uOlq2kB34o #threathunting

— Censys (@censysio) February 4, 2025


Indirect branches are also a very interesting topic, here is a nice follow-up: https://t.co/Tk6I7R4k1m https://t.co/3rw7ZAoSQG

— Duncan Ogilvie 🍍 (@mrexodia) February 4, 2025


"This blog post aims to provide a detailed blueprint for how Google has created and deployed a high-assurance web framework that almost completely eliminates exploitable web vulnerabilities."https://t.co/7TsK8ZFRrO

— Royal Hansen (@royalhansen) February 4, 2025


Our linux adventures continue with @RFGroenewoud‘s next article on Persistence Mechanisms! Part 3 focuses on the theory, practice, and detection of several complicated Persistence techniques. See the breakdown: https://t.co/C61vGudHRe#ElasticSecurityLabs

— Elastic Security Labs (@elasticseclabs) February 4, 2025


SSL-bypass : Root Detection & SSL Bypass Script - It utilizes Frida's powerful JavaScript injection capabilities to bypass both root detection and SSL certificate pinning in Android applications : https://t.co/y6EOxXaoZ3 credits @_shadowintel_ pic.twitter.com/ZcG3bGioJN

— Binni Shah (@binitamshah) February 4, 2025


Secure Enclaves for Offensive Operations (Part I) by Outflank
Team. https://t.co/mpGbW5zlUM pic.twitter.com/IZNI1YhyOm

— Smukx.E (@5mukx) February 3, 2025


Don't miss what's next. Subscribe to the grugq's newsletter:
X