Github | https://github.com/tyranid |
Blog | https://www.tiraniddo.dev/ |
Github | https://github.com/tyranid |
Blog | https://www.tiraniddo.dev/ |
so the Bluesky age filtering is absolutely minimal technically-in-compliance - and it's client side!
here are multiple ways around it
https://gist.github.com/mary-ext/6e27b24a83838202908808ad528b3318
I'm still proxying via Germany, but might try some of these
If you have a machine with PKEY support and somewhat recent Linux kernel you can now play around with hardware support for the V8 sandbox. When active, JS + Wasm code has no write permissions outside the sandbox address space. To enable, simply set `v8_enable_sandbox_hardware_support = true` at build time.
It's not (yet) meant for production use, but should offer a preliminary look at where things might be heading. See https://crbug.com/350324877 for more details.
Feedback welcome! :)
🚨 Our new blog post about Windows CVE-2025-33073 which we discovered is live:
🪞The Reflective Kerberos Relay Attack - Remote privilege escalation from low-priv user to SYSTEM with RCE by applying a long forgotten NTLM relay technique to Kerberos:
https://blog.redteam-pentesting.de/2025/reflective-kerberos-relay-attack/
It is a sad truth in IT security that some vulnerabilities never quite want to die and time and time again, vulnerabilities that have long been fixed get revived and come right back at you. While researching relay attacks, the bane of Active …
Pretty neat research, the fact that MSRC doesn't want to fix it is pretty disappointing. https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory
It's not like the LDAP server hasn't had "fixes" in the past for potentially abusing object classes, like it was hard to create gMSAs as there was an explicit block in the code. Even more so for a new feature, when they already have a privilege block to prevent migration alone, they could have applied that to creation as well.
Thrilled to announce my new Project Zero blog post is LIVE! 🎉 I detail my knowledge-driven fuzzing process to find sandbox escape vulnerabilities in CoreAudio on MacOS.
I'll talk about this and the exploitation process next week
@offensive_con
https://googleprojectzero.blogspot.com/2025/05/breaking-sound-barrier-part-i-fuzzing.html
James Forshaw @tiraniddo , author of Attacking Network Protocols & Windows Security Internals, will be at Off-by-One as a Keynote Speaker: https://offbyone.sg/conference/james-forshaw
Eugene Lim, author of From Day Zero to Zero Day, will also be at Off-by-One running a smart device hacking village: https://offbyone.sg/activities/smart-weighing-machine-hacking
Off-by-One Conference is a cybersecurity conference where like-minded professionals gather and exchange technical insights while gaining knowledge from one another. As the offensive security landscape continues to evolve, the Conference will also serve as a community to nurture and showcase new and uprising local and regional researchers.