
HN Security
@hnsec
Followers
238
Following
82
Media
1
Statuses
134
RT @0xdea: @orange_8361 @guitmz So great to see all your efforts finally being rewarded, congrats!. Your article strongly resonates with me….
0
1
0
RT @orange_8361: Turns out my #PHRACK article is live! 🔥. > The Art of PHP — My CTF Journey and Untold Stories!. Kinda a love letter to tho….
0
210
0
RT @phrack: At long last - Phrack 72 has been released online for your reading pleasure! . Check it out: https://t.….
0
327
0
RT @0xdea: Always happy news to see my work spark new joy. In this case, my @semgrep ruleset at Congrats to @trail….
github.com
A collection of my Semgrep rules to facilitate vulnerability research. - 0xdea/semgrep-rules
0
11
0
In our last post, @apps3c shares some PoCs of GenAI/LLM security issues found in real-world assessments conducted for corporate clients, with a focus on vulnerabilities that can be exploited to gain unauthorized access to data, resources, and services.
security.humanativaspa.it
Generative AI and LLM technologies have shown […]
0
3
11
RT @xorpse: I'm pleased to announce a new version of the Rust bindings for @HexRaysSA IDA Pro! With:. - Improved strings, metadata, and cor….
0
33
0
RT @HumanativaGroup: 🔍 Durante un assessment, Gianluca Baldi di @hnsec ha individuato una vulnerabilità ad alto impatto nella Microsoft Gr….
security.humanativaspa.it
Some months ago, while analyzing a […]
0
1
0
In our last blog post, our colleague Gianluca shares the story of a lucky discovery: a bug initially spotted during a routine assessment turned out to be a high impact vulnerability in Microsoft Graph API — earning a $3,000 bounty.
security.humanativaspa.it
Some months ago, while analyzing a […]
0
8
17
RT @HexRaysSA: Power users are taking IDA headless with idalib. Think large-scale diffing, custom UIs, and CI pipelines. all without laun….
hex-rays.com
Discover four powerful ways to use idalib, IDA Pro’s headless automation interface, for scalable reverse engineering, CI integration, and more.
0
14
0
RT @2ourc3: Releasing this fun tool Golem based on @0xdea, LLVM, LLM and @semgrep . Golem automates C/C++ vulnerability discovery by combi….
bushido-sec.com
Discover how combining SemGrep, LLVM, and local LLMs like Ollama can boost vulnerability research. From funny IKEA frustrations to slicing control-flow graphs, meet Golem—your new automated bug...
0
43
0
RT @raelizecom: Our FI training #TAoFI is, in itself, a broad experiment in porting FI attacks across different techniques, from EMFI to V….
0
5
0
RT @exploitsclub: Another Week, Another EXPLOITS CLUB 📰. ---.🎉 Binja giveaway: sign up to support the newsletter 🎉.---. Tesla wall charger….
blog.exploits.club
Pacers in 7. Annnnyways 👇 Don't Forget! We are doing a Binary Ninja personal License Giveaway! All you have to do is: 1. Subscribe to the newsletter. C'mon - that should be easy enough. Winner will...
0
12
0
Exploring fault injection on ESP32 V3! . Inspired by Delvaux work, we tested voltage #glitching as an attack vector. With advanced triggers & GDB, we achieved a ~1.5% success rate. #Hardware #FaultInjection is becoming more practical! .
security.humanativaspa.it
Intro A few months ago, I […]
0
6
18
RT @0xdea: And here are the latest #VulnerabilityResearch and #ReverseEngineering tools that I wrote in #Rust. http….
github.com
Reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis. - 0xdea/oneiromancer
0
23
0
RT @xorpse: We're are happy to announce a new release of our #Rust bindings for @HexRaysSA idalib. What's new:.- New APIs for working with….
github.com
Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib - binarly-io/idalib
0
21
0