Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

buherator@infosec.placeB

buherator@infosec.place

@buherator@infosec.place
About
Posts
18
Topics
10
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • This is me, arguing with rustc about setting one bit in memory:https://www.youtube.com/watch?v=Hz1JWzyvv8A
    buherator@infosec.placeB buherator@infosec.place
    This is me, arguing with rustc about setting one bit in memory:

    https://www.youtube.com/watch?v=Hz1JWzyvv8A
    Uncategorized

  • [RSS] Building a Secure Electron Auto-Updaterhttps://blog.doyensec.com/2026/02/16/electron-safe-updater.html
    buherator@infosec.placeB buherator@infosec.place
    [RSS] Building a Secure Electron Auto-Updater

    https://blog.doyensec.com/2026/02/16/electron-safe-updater.html
    Uncategorized

  • OPNSense managed to destroy itself during an update, still people wonder why companies buy Fortinet...
    buherator@infosec.placeB buherator@infosec.place
    @kstrlworks It looks like a transient error, most likely a corrupt download. Shit happens ofc, but he only acceptable reason for bricking the system would be hardware error which is very unlikely because other VMs on the same host run just fine.
    Uncategorized

  • OPNSense managed to destroy itself during an update, still people wonder why companies buy Fortinet...
    buherator@infosec.placeB buherator@infosec.place
    @kstrlworks Clean install from ISO (latest minor) -> firmware update from webUI to latest patch. The updater removed basic files, then failed to extract the updated ones so everything just stopped working.
    Uncategorized

  • #wh40k #windows
    buherator@infosec.placeB buherator@infosec.place
    #wh40k #windows
    Uncategorized wh40k windows

  • OPNSense managed to destroy itself during an update, still people wonder why companies buy Fortinet...
    buherator@infosec.placeB buherator@infosec.place
    OPNSense managed to destroy itself during an update, still people wonder why companies buy Fortinet...
    Uncategorized

  • Naming things is freaking hard...
    buherator@infosec.placeB buherator@infosec.place
    @cR0w Good enough, where do I send the money?
    Uncategorized

  • Naming things is freaking hard...
    buherator@infosec.placeB buherator@infosec.place
    @cR0w Do you have experience in pulling information out of thin air? Because I know of no other sources but need the bits...
    Uncategorized

  • Naming things is freaking hard...
    buherator@infosec.placeB buherator@infosec.place
    Naming things is freaking hard...
    Uncategorized

  • Here's a thought experiment.
    buherator@infosec.placeB buherator@infosec.place
    @sjn Assuming by AI we mean LLMs, this stamp would essentially say "no one cared to think this through".
    Uncategorized llm poll

  • wrote a short blog post about some toying around I did with using kprobes to get around a mitigation in order to disable SMEP/SMAP:https://blog.zolutal.io/two-shot-kernel-shellcode/
    buherator@infosec.placeB buherator@infosec.place
    @zolutal Thanks, that's a quite common problem (template designers rarely know about RSS these days), I'll add /feed to the list of paths I have to try manually...
    Uncategorized

  • wrote a short blog post about some toying around I did with using kprobes to get around a mitigation in order to disable SMEP/SMAP:https://blog.zolutal.io/two-shot-kernel-shellcode/
    buherator@infosec.placeB buherator@infosec.place
    @zolutal Could you please add RSS/Atom to your blog?
    Uncategorized

  • Check Point Harmony Local Privilege Escalation (CVE-2025-9142)https://blog.amberwolf.com/blog/2026/january/advisory---check-point-harmony-local-privilege-escalation-cve-2025-9142//via @badsectorlabs
    buherator@infosec.placeB buherator@infosec.place
    Check Point Harmony Local Privilege Escalation (CVE-2025-9142)

    https://blog.amberwolf.com/blog/2026/january/advisory---check-point-harmony-local-privilege-escalation-cve-2025-9142/

    /via @badsectorlabs
    Uncategorized

  • being sent a sketchy file and then asked to click on a link in it isn't "remote" code execution actually
    buherator@infosec.placeB buherator@infosec.place
    @gsuberland @invoxiplaygames.uk Calling this RCE is at least consistent with MS's own taxonomy (see previous Office vulns). CVSS UI:R is also a meaningful datapoint for those parsing their feed.
    Uncategorized

  • [RSS] Shellcode as 'XML'https://tmpest.dev/shellcode_as_xml.html
    buherator@infosec.placeB buherator@infosec.place
    [RSS] Shellcode as 'XML'

    https://tmpest.dev/shellcode_as_xml.html
    Uncategorized

  • [RSS] Strengthening the Foundation: A Joint Security Review of Intel TDX 1.5https://bughunters.google.com/blog/a-joint-security-review-of-intel-tdx-15
    buherator@infosec.placeB buherator@infosec.place
    [RSS] Strengthening the Foundation: A Joint Security Review of Intel TDX 1.5

    https://bughunters.google.com/blog/a-joint-security-review-of-intel-tdx-15
    Uncategorized

  • [RSS] Intego X9: When your macOS antivirus becomes your enemyhttp://blog.quarkslab.com/intego_lpe_macos_1.html
    buherator@infosec.placeB buherator@infosec.place
    [RSS] Intego X9: When your macOS antivirus becomes your enemy

    http://blog.quarkslab.com/intego_lpe_macos_1.html
    Uncategorized

  • #Keycloak CVE-2026-1529: "lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access."https://access.redhat.com/security/cve/cve-2026-1529#JWT
    buherator@infosec.placeB buherator@infosec.place
    #Keycloak CVE-2026-1529: "lack of cryptographic signature verification allows the attacker to successfully self-register into an unauthorized organization, leading to unauthorized access."

    https://access.redhat.com/security/cve/cve-2026-1529

    #JWT
    Uncategorized jwt keycloak
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups