5.4K Followers
57 Following
125 Posts
pressing f8 over and over

CUDA de Grâce

Talk by @chompie1337 and Samuel Lovejoy about exploiting a race condition that leads to a double-free in the NVIDIA GPU driver to escape a container created with NVIDIA Container Toolkit.

Video: https://www.youtube.com/watch?v=Lvz2_ZHj3lo
Slides: https://docs.google.com/presentation/d/1FgfURpMyHhnflGWtxeq8ClPPaB5ZDCzT/edit?usp=sharing

HEXACON 2025 - CUDA de Grâce by Valentina Palmiotti & Samuel Lovejoy

YouTube
Hexacon - Conference – Speakers

Discover the accepted talks for this edition!

Hexacon
kernel hackers go serverless
ring0 → cloud 9 ☁️ ??
brb pwning yr gpu nodes ✨

Phrack turns 40.
The digital drop is live.
Download it. Archive it. Pass it on.
💾 https://www.phrack.org

#phrackat40 #phrack72

I've been asked countless times how to learn VR & xdev. The answer is always: "do something you think is cool". It's hard to figure out what to do. Try the PhrackCTF which I've now open-sourced. It's not a contrived CTF - modeled after real vulnerabilities

https://github.com/xforcered/PhrackCTF

GitHub - xforcered/PhrackCTF: Binary Exploitation Phrack CTF Challenge

Binary Exploitation Phrack CTF Challenge. Contribute to xforcered/PhrackCTF development by creating an account on GitHub.

GitHub
Tomorrow 7 PM PDT! Livestream w me and @malwaretech. We’ll look at this month’s Patch Tuesday, dissect a bindiff, and try to turn it into an exploit. I might also try to get him to solve the STILL UNSOLVED Windows Phrack CTF challenge 🤔
http://twitch.tv/malwaretechblog
MalwareTechBlog - Twitch

Cybersecurity, Tech, and General Discussions with Marcus Hutchins AKA MalwareTech. About Me: https://escapingtech.com/about/

Twitch

Are you going to @defcon ??

We'll have 9500 print copies of Phrack distributed around the con! Come to main stage Sunday @ noon to see phrack staffers @netspooky @richinseattle and @chompie1337 talk hacker history!

https://info.defcon.org/content/?id=60386

Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application.

https://www.ibm.com/think/x-force/operationalizing-browser-exploits-to-bypass-wdac

Operationalizing browser exploits to bypass Windows Defender Application Control (WDAC)

Previously discovering a method for bypassing even the strictest WDAC policies by backdooring trusted Electron applications, the IBM X-Force Red team continued their research and can now bypass the restriction of executing JavaScript code only.

The Exploit Development Life Cycle: From Concept to Compromise /by @chompie1337

https://www.youtube.com/watch?v=ce0bXORSMX4
KEYNOTE: The Exploit Development Life Cycle: From Concept to Compromise, Valentina Palmiotti

YouTube
Exciting news! I’m starting X-Force’s new offensive research team (XOR) and hiring a security researcher. Want to work with myself and other researchers to find bugs, exploit popular targets, and share your work? Apply for this unique (remote) role 😊 (US or Canada only, but stay on the lookout for Europe based positions in the future) https://careers.ibm.com/job/21219320/security-researcher-san-jose-ca/
Job Details

IBM has a career opportunity for a Security Researcher in San Jose, CA

IBM