Ебанутый рандомный вопрос посреди недели. Вы ставите будильник на выходные?
Final Results
52%
Да
48%
Нет
Case Study: IOMobileFramebuffer NULL Pointer Dereference
https://afine.com/case-study-iomobileframebuffer-null-pointer-dereference/
https://afine.com/case-study-iomobileframebuffer-null-pointer-dereference/
AFINE - digitally secure
Case Study: IOMobileFramebuffer NULL Pointer Dereference - AFINE - digitally secure
Learn how broken access and Null Pointer Dereference were found in the macOS IOMobileFramebuffer (AppleCLCD2) driver.
A powerful, modular, lightweight and efficient command & control framework written in Nim.
https://github.com/hdbreaker/Nimhawk
https://github.com/hdbreaker/Nimhawk
GitHub
GitHub - hdbreaker/Nimhawk: A powerful, modular, lightweight and efficient command & control framework written in Nim.
A powerful, modular, lightweight and efficient command & control framework written in Nim. - hdbreaker/Nimhawk
Building Own MCP - Augmented LLM for Threat Hunting
https://tierzerosecurity.co.nz/2025/04/29/mcp-llm.html
https://tierzerosecurity.co.nz/2025/04/29/mcp-llm.html
Tier Zero Security
Information Security Services. Offensive Security, Penetration Testing, Mobile and Application, Purple Team, Red Team
GRUB2-based Bootkit: New Malware Threat Suspected to be Linked to the NSA's Equation Group
https://mp.weixin.qq.com/s/TgSWYEbkV0dq-ukNDUESOA?poc_token=HGTYEWijnsqGF-W1hh98Ok6OCoyWOjx7MnHYbUMp
https://mp.weixin.qq.com/s/TgSWYEbkV0dq-ukNDUESOA?poc_token=HGTYEWijnsqGF-W1hh98Ok6OCoyWOjx7MnHYbUMp
Tracing and Manipulating Anti-Analysis Techniques with DynamoRIO
https://0xreverse.com/tracing-and-manipulating-anti-analysis-techniques-with-dynamorio
https://0xreverse.com/tracing-and-manipulating-anti-analysis-techniques-with-dynamorio
iOS 18.5 Beta 4(and below) MobileCoreService persistence exploit
https://github.com/seanistethered/EvilWorkspace
https://github.com/seanistethered/EvilWorkspace
GitHub
GitHub - cr4zyengineer/EvilWorkspace: iOS 18.5 Beta 4(and below) MobileCoreService persistence exploit. Discovered by me!
iOS 18.5 Beta 4(and below) MobileCoreService persistence exploit. Discovered by me! - cr4zyengineer/EvilWorkspace
Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages
https://googleprojectzero.blogspot.com/2025/05/breaking-sound-barrier-part-i-fuzzing.html
https://googleprojectzero.blogspot.com/2025/05/breaking-sound-barrier-part-i-fuzzing.html
projectzero.google
Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages - Project Zero
Guest post by Dillon Franke, Senior Security Engineer, 20% time on Project Zero Every second, highly-privileged MacOS system daemons accept and proces...
Malware Development Tutorial: Bypassing Windows Defender With This EASY Technique
https://www.youtube.com/watch?v=CSt5wcvNjBU
https://www.youtube.com/watch?v=CSt5wcvNjBU
YouTube
Malware Development Tutorial: Bypassing Windows Defender With This EASY Technique
Malware Development Tutorial: Bypassing Windows Defender with SMB Staging
In this step-by-step malware development tutorial, you’ll discover how to bypass Windows Defender using a powerful technique called SMB staging. By delivering shellcode over a remote…
In this step-by-step malware development tutorial, you’ll discover how to bypass Windows Defender using a powerful technique called SMB staging. By delivering shellcode over a remote…
ManuFuzzer is an LLVM-based binary, coverage-guided fuzzing framework for macOS
https://github.com/ant4g0nist/ManuFuzzer
https://github.com/ant4g0nist/ManuFuzzer
GitHub
GitHub - ant4g0nist/ManuFuzzer: Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM
Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM - ant4g0nist/ManuFuzzer
1day practice - Escape macOS sandbox (partial) using RemoteViewServices
https://github.com/wh1te4ever/CVE-2025-31258-PoC
https://www.youtube.com/watch?v=GlReVUh_4W4
https://github.com/wh1te4ever/CVE-2025-31258-PoC
https://www.youtube.com/watch?v=GlReVUh_4W4
GitHub
GitHub - wh1te4ever/CVE-2025-31258-PoC: 1day practice - Escape macOS sandbox (partial) using RemoteViewServices
1day practice - Escape macOS sandbox (partial) using RemoteViewServices - wh1te4ever/CVE-2025-31258-PoC