"DiaSymbolView is a tool for visually inspecting debug information recorded in .pdb files. It relies on MSDIA API and presents a hierarchy of debug symbols and their 200+ properties."

https://github.com/diversenok/DiaSymbolView

#fromBsky
GitHub - diversenok/DiaSymbolView: PDB file inspection tool

PDB file inspection tool. Contribute to diversenok/DiaSymbolView development by creating an account on GitHub.

GitHub
OffensiveCon 2026 announced:

https://www.offensivecon.org/

#fromBsky
Welcome | OffensiveCon

WOOT '25 Technical Sessions

USENIX
How Compiler Explorer Works in 2025 — Matt Godbolt’s blog
https://xania.org/202506/how-compiler-explorer-works

#fromBsky
How Compiler Explorer Works in 2025 — Matt Godbolt’s blog

How we handle 92 million compilations a year without everything catching fire

"[Steam breach] debunked [...] source of it all is an AI company's LinkedIn post that itself looks AI made itself"

https://bsky.app/profile/tannerofthenorth.bsky.social/post/3lp572utm5c2c

h/t @neurovagrant

#fromBsky
Neco-Tan (@tannerofthenorth.bsky.social)

It's been debunked, valve confirmed they don't even use the company that is said to be hacked (a SMS 2FA company) and the source of it all is an AI company's LinkedIn post that itself looks AI made itself I mean, $5000 for 89 MILLION steam accounts? Come on. Just have Steam Guard and you're good. [contains quote post or other embedded content]

Bluesky Social
In Memoriam: Mark Klein, AT&T Whistleblower Who Revealed NSA Mass Spying | Electronic Frontier Foundation
https://www.eff.org/deeplinks/2025/03/memoriam-mark-klein-att-whistleblower-about-nsa-mass-spying

#fromBsky
In Memoriam: Mark Klein, AT&T Whistleblower Who Revealed NSA Mass Spying

EFF is deeply saddened to learn of the passing of Mark Klein, a bona fide hero who risked civil liability and criminal prosecution to help expose a massive spying program that violated the rights of millions of Americans.Mark didn’t set out to change the world. For 22 years, he was a...

Electronic Frontier Foundation
A very fancy way to obtain RCE on a Solr server

FBI files on Kevin Mitnick released thx to a FOIA request by hexadecim8.com

https://vault.fbi.gov/kevin-mitnick/kevin-mitnick-part-01-final/view

#frombsky
Hexadecim8.com

Trying Out Binary Ninja's new WARP Signatures with IPSW Diff'ing
https://www.seandeaton.com/binary-ninja-warp-signatures/

#frombsky
Trying Out Binary Ninja's new WARP Signatures with IPSW Diff'ing

Binary diff'ing is pretty complex, but being able to apply markup from one binary to another is quite powerful. Binary Ninja's new WARP extends previous efforts, using SigKit, to quickly identify library functions.

Sean Deaton
[2412.20324] AFLNet Five Years Later: On Coverage-Guided Protocol Fuzzing

https://arxiv.org/abs/2412.20324

#frombsky
AFLNet Five Years Later: On Coverage-Guided Protocol Fuzzing

Protocol implementations are stateful which makes them difficult to test: Sending the same test input message twice might yield a different response every time. Our proposal to consider a sequence of messages as a seed for coverage-directed greybox fuzzing, to associate each message with the corresponding protocol state, and to maximize the coverage of both the state space and the code was first published in 2020 in a short tool demonstration paper. AFLNet was the first code- and state-coverage-guided protocol fuzzer; it used the response code as an indicator of the current protocol state. Over the past five years, the tool paper has gathered hundreds of citations, the code repository was forked almost 200 times and has seen over thirty pull requests from practitioners and researchers, and our initial proposal has been improved upon in many significant ways. In this paper, we first provide an extended discussion and a full empirical evaluation of the technical contributions of AFLNet and then reflect on the impact that our approach and our tool had in the past five years, on both the research and the practice of protocol fuzzing.

arXiv.org