Github | https://github.com/blue-devil |
Github | https://github.com/blue-devil |
"Witch Club Satan" has dropped a new single with an official video; EPIC! Not for the fainted hearts; but actually for everyone.
Witch Club Satan - You Wildflower
https://www.youtube.com/watch?v=WvgixsYAUvE
#black #blackmetal #FemaleVocal #NorwegianMetal #single #music
CapLoader includes a feature for Port Independent Protocol Identification (PIPI), which can detect which protocol is being used inside of TCP and UDP sessions without relying on the port number. In this video CapLoader identifies the PureLogs C2 protocol. The PureLogs protocol detection was added to[...]
New #Single from #Katatonia is dropped:
KATATONIA - Wind of no Change
https://www.youtube.com/watch?v=Z87lfS3KaqA
CVE-2025-31200 Writeup from noahhw
Background On April 16, 2025, Apple released a patch for a bug in CoreAudio which they said was “Actively exploited in the wild.” This flew under the radar a bit. Epsilon’s blog has a great writeup of the other bug that was presumably exploited in this chain: a bug in RPAC. The only thing out there that I am aware of about the CoreAudio side of the bug is a video by Billy Ellis (it’s great.
[CVE-2025-37752] Two Bytes Of Madness: Pwning The Linux Kernel With A 0x0000 Written 262636 Bytes Out-Of-Bounds
CVE-2025-37752 is an Array-Out-Of-Bounds vulnerability in the Linux network packet scheduler, specifically in the SFQ queuing discipline. An invalid SFQ limit and a series of interactions between SFQ and the TBF Qdisc can lead to a 0x0000 being written approximately 256KB out-of-bounds at a misaligned offset. If properly exploited, this can enable privilege escalation.
CVE-2020-27786 ( Race Condition + Use-After-Free )
CC: @ii4gsp