102 Followers
401 Following
103 Posts

Jack of all cyber security, occasional dabbler in vulnerability research. Windows Internals teacher

www.acepace.net
https://github.com/acepace
Co creator of the Infection Monkey

I'm curious, is there a consolidated place with writeups/solve-scripts for CTFs?
Thinking about this as I write solutions for all the #xbow benchmarks
This is impressive technical investigation: https://github.com/Zephkek/Asus-ROG-Aml-Deep-Dive
GitHub - Zephkek/Asus-ROG-Aml-Deep-Dive: A deep dive into the ACPI.sys DPC latency problems on Asus ROG laptops

A deep dive into the ACPI.sys DPC latency problems on Asus ROG laptops - Zephkek/Asus-ROG-Aml-Deep-Dive

GitHub

I’ve been waiting a long time to see this out in the open.

Memory Integrity Enforcement delivers the strongest memory safety mitigations in the industry—by far. It sets a new standard for device security.

@shac posted a nice story a while ago, about the first 64-bit ARM architecture: over 12 years ago, Apple launched the iPhone 5s and introduced the ARM64 CPU. It was the first public disclosure of a 64-bit ARM architecture. No one else was even close to having a chip ready to tape out, let alone ship in a product—and the performance was a Frankenstein.

But what is often overlooked is the execution. When iOS shipped, it was a full 64-bit native release. There was no 32-bit code in the OS image (beyond the components required to support 32-bit third-party apps). Everything was aligned to the new architecture, including complex subsystems like the Safari JavaScript engine. Everything was ready on day one.

**This level of execution is something only Apple can deliver.**

And today, we see the same capabilities applied to security.

I’m deeply grateful to have been part of the exceptional team that worked tirelessly to make this happen.

@dave_aitel do you answer DMs on any social media?
@carrot_c4k3 hey, any way to DM or email you?

This blog post took me two days to write. I hope someone out there enjoys it, because I sure didn't.

https://nibblestew.blogspot.com/2025/08/we-need-to-seriously-think-about-what.html

So how come with two decades of XSS, there are zero papers trying to model html interactions to define formally define XSS vulnerabilities?

Not sure what to tag for reach

So what's today's modern leak aggregator? I want a semi old tencent leak
On the review board we have @sherrod_im @gentilkiwi and many others I can't find here (yet)

BluehatIL 2025 CFP is open!
It's a great stage and a fun conference. Probably the best Israel has to offer

Go submit😺
https://www.microsoftrnd.co.il/bluehatil/conference/CFP
#cfp #defense #vulnerability #conference

BlueHatIL - Call For Papers