Someone made a port of Doom that runs in a PDF

I'm just...

https://github.com/ading2210/doompdf

Same person got Linux working inside a PDF document

An entire kernel and OS running in a PDF. What a time to be alive

https://github.com/ading2210/linuxpdf

@cypnk i see your "doom/linux running in PDF" and raise you "Pokémon running in a font" https://www.coderelay.io/fontemon.html
code relay - Fontemon

@cypnk since the previous post is Doing Numbers, folks may also enjoy this 2021 zero-click iMessage exploit by notorious Israeli spyware-for-despotic-nation-states firm NSO Group, which involved sending a .gif file that was actually a PDF that used the now-uncommon JBIG2 black-and-white image compression format which, surprisingly, is Turing-complete.

As this Project Zero blog post explains,

JBIG2 doesn't have scripting capabilities, but when combined with a vulnerability, it does have the ability to emulate circuits of arbitrary logic gates operating on arbitrary memory. So why not just use that to build your own computer architecture and script that!? That's exactly what this exploit does. Using over 70,000 segment commands defining logical bit operations, they define a small computer architecture with features such as registers and a full 64-bit adder and comparator which they use to search memory and perform arithmetic operations. It's not as fast as Javascript, but it's fundamentally computationally equivalent.

A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution

Posted by Ian Beer & Samuel Groß of Google Project Zero We want to thank Citizen Lab for sharing a sample of the FORCEDENTRY exploit w...

@nev Amazing. I had totally forgotten about this. And if this is the caliber of exploit available at the time, I wonder what other amazing feats are possible now