107 Followers
628 Following
367 Posts
Interested in Linux + Security, CTF with PFS

Pwndbg 2026.02.18 is out! Enhance your GDB or LLDB experience!

We visualize branches in nearpc, synchronize your decompiler (IDA/Binja/Ghidra) via decomp2dbg, annotate stack variabless from debug info or decompiler, support new Linux kernel debugging commands - for tracing SLUB allocs/frees or dumping tasks information.

See what's changed in: https://github.com/pwndbg/pwndbg/releases/tag/2026.02.18

Want Pwndbg to keep moving fast, or, having us give a talk about it? Sponsor us: https://github.com/sponsors/pwndbg/

#gdb #lldb #pwndbg #pwn #ctf #reverseengineering

Here it is, our biggest issue to date, Issue #8!
Read, share, enjoy!
https://pagedout.institute/?page=issues.php
Get prints here - https://www.lulu.com/search?page=1&pageSize=4&sortBy=PRICE_ASC&q=PAGEDOUT8&adult_audience_rating=00

And with that CFP for #9 is open - deadline 30 April 2026

Paged Out!

Deeply technical zine. And it's free.

Paged Out!

We derestricted a number of vulnerabilities found by Big Sleep in JavaScriptCore today: https://issuetracker.google.com/issues?q=componentid:1836411%20title:JavascriptCore

All of them were fixed in the iOS 26.1 (and equivalent) update last month. Definitely some cool bugs in there!

Google Issue Tracker

When a kernel commit starts with "In A.D. 1582 Pope Gregory XIII found that ..." you know you're in for a ride:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f076ef44a44d02ed91543f820c14c2c7dff53716
tl;dr: Rockchip decided November should have 31 days...
rtc: rk808: Compensate for Rockchip calendar deviation on November 31st - kernel/git/torvalds/linux.git - Linux kernel source tree

LLVM will soon protect cryptographic code from timing attacks at the compiler level. The compiler translates __builtin_ct_select across multiple architectures (x86-64, i386, ARM, AArch64) to appropriate constant-time implementations using native instructions, such as cmov or CSEL, where available, or masked arithmetic patterns elsewhere. https://blog.trailofbits.com/2025/12/02/introducing-constant-time-support-for-llvm-to-protect-cryptographic-code/
Introducing constant-time support for LLVM to protect cryptographic code

Trail of Bits developed constant-time coding support for LLVM that prevents compilers from breaking cryptographic implementations vulnerable to timing attacks, introducing the __builtin_ct_select family of intrinsics that preserve constant-time properties throughout compilation.

The Trail of Bits Blog

Binary Ninja 5.2, Io, is live and it's out of this world! https://binary.ninja/2025/11/13/binary-ninja-5.2-io.html

With some of our most requested features of all time including bitfield support, containers, hexagon, Ghidra import, and a huge upgrade to TTD capabilities, plus a ton more, make sure to check out the changelog!

The new version of my #BinaryNinja plugin Obfuscation Analysis (v1.2) adds recursive function inlining in the decompiler.

It collapses call-heavy code into a single function; analysis, constant propagation, DCE and other analyses work across boundaries.

https://github.com/mrphrazer/obfuscation_analysis

#reverseengineering

pagedout.institute ← we've just released Paged Out! zine Issue #7
https://pagedout.institute/download/PagedOut_007.pdf ← direct link
https://lulu.com/search?page=1&pageSize=4&sortBy=PRICE_ASC&q=PAGEDOUT7 ← prints for zine collectors
https://pagedout.institute/download/PagedOut_007_wallpaper.jpg ← issue wallpaper
Enjoy!

Please please please share to spread the news - thank you!

@zhuowei i never understood that TPM/SGX/enclave/attestation discussion in first place

For the side channel crowd:

I wrote about how side channels in serialization can theoretically allow breaking ASLR - with a theoretical worst-case example of how a single round trip of deserializing attacker-controlled data, serializing the result again, and sending the re-serialized data to an attacker could leak an entire pointer:
"Pointer leaks through pointer-keyed data structures"
https://googleprojectzero.blogspot.com/2025/09/pointer-leaks-through-pointer-keyed.html

Pointer leaks through pointer-keyed data structures

Posted by Jann Horn, Google Project Zero Introduction Some time in 2024, during a Project Zero team discussion, we were talking about how...