Profile avatar
alkalinesec.bsky.social
mobile security / symbolic execution . he / him
24 posts 114 followers 172 following
Prolific Poster
Conversation Starter

Being an exploit dev in 2025 allows you to write JavaScript professionally without having to use React, Node.js, or any library at all, really—there’s something beautiful about that

apple typhlosion

incredible exploit

github.com/electronicar... 🔥🔥🔥

Speedrunners are Vulnerability Researchers https://zetier.com/speedrunners-are-vulnerability-researchers/

this is such an annoying issue when trying to do hacky mobile app dev stuff. every answer about reflection or using private frameworks is like "gp/apple says not to do this, so you are bad and dumb for asking"

We're excited to join Bluesky! The Lean FRO develops Lean, an interactive theorem prover and functional programming language advancing mathematics, formal verification, and AI. Follow us for updates on our roadmap and community. #leanlang #leanprover #mathematics #formalverification #ai

"type theory" is just a theory. like evolution. and last time i checked there were no dinosaurs OR monads in the bible

Comparison of Android-based Operating Systems https://eylenburg.github.io/android_comparison.htm

it looks like lte infra was hosting @moyix.net 's evangelion ctf challenge. but i doubt the terminal interface for CVE-2024-24451 was as cool

sometimes the legitimacy of these files is so extreme they panic the kernel or crash BackgroundShortcutRunner. this is both normal and good.

Headline: 19 Year Old DDoS Skid Gets Access To Nations Infrastructure Security Bug Reports

New updates in LIEF including better support for PE modifications and ARM64EC/ARM64X binaries. Blog post: lief.re/blog/2025-02...

everyone using lockdown mode is missing out on incredibly cool and extremely legitimate watchface and shortcuts files. turn off lockdown mode today!

Crap crap crap. www.washingtonpost.com/technology/2...

@xbow.com has been busy in the first few weeks of 2025 – our agent has autonomously found 106 vulnerabilities in OSS projects, and we've reported 72 so far! Amazing work by @nicowaisman.bsky.social and the security team triaging these and getting them into the disclosure->fix pipeline!

oh hello there: github.com/google/secur...

Formally verified binary-level pointer analysis. ~ Freek Verbeek, Ali Shokri, Daniel Engel, Binoy Ravindran. arxiv.org/abs/2501.17766 #ITP #IsabelleHOL

Remember to spread a little joy, even if it will be fleeting

New attacks on load address prediction, affects Apple Silicon. predictors.fail

this aspect of differential cryptanalysis research always cracks me up a little. afaict half of the published attacks just come from smart people thinking about it really hard

This afternoon I asked Ole about a bug with Frida & iOS simulator. 2 hours later he had a fix committed and just now he published a new release including the fix ❤️ Absolute legend, thanks for everything you do. frida.re/news/2025/01...

Happy and honored to receive the 2025 ACM SIGSOFT Influential Educator Award! The citation refers to my work on interactive textbooks such as fuzzingbook.org and debuggingbook.org. Thanks to all who helped making this possible!

C IS LEGAL AGAIN

This is a great post on bug bounty reddit! OP reported an IDOR, gets paid $2,000, and then realizes it never was IDOR. It's just a cached response...

goin out on top

didn't know about the XNU commpage before. definitely cool to have a known readable address with some interesting info in it. github.com/apple/darwin...

this is a silly example of radius2 automatically solving a very simple pwn challenge from xmas ctf 2019. a simple buffer overflow leads to an unconstrained ret addr which is then set to be the xref of the flag prefix X-MAS

every time i start a ctf to try to test radius2 stuff the rev challenges are like "heres a custom level from Sims 2...". tonight all the challenges are fuckin verilog. can i please just have one (1) normal elf binary

crackme100 from picoCTF 2024 is a good example of how odd SMT solvers sometimes are. many correct inputs exist, including only using [a-z]. but adding an unused _ to the allowed chars lowers the solve time from 24s to 7s.

radius2 solution to this educational crackme! unfortunately the printf sim assumes that the format args are in x1... instead of pointed to by x8 which is the *OS convention. for a christmas gift to myself i will fix this and make a bunch of other radius2 improvements

if one-time pads are so good why is there no two-time pad?

Did you solved yesterday’s advent crackme using ESIL emulation? If so, try writing a oneliner that solves it without any extra interactions! Post it if you do! Today's advent post will help you learn about moving around the disassembly more swiftly! www.radare.org/advent/12.html #aor24

too many browser extensions slowing down your mac? just delete everything in /System/Library/Extensions

very cool use of z3 www.mattkeeter.com/projects/syn...

Two students I supervised just got the CAST award 🥇 Both reversed wireless components in the iOS ecosystem. Nils Rollshausen for their thesis ⌚️ "WatchWitch: Investigating Apple Watch Interoperability and Security" Inga Dischinger for her thesis 📸 "Security Analysis of Apple's Continuity Camera"

theres def still lots of silly macOS / iOS env var vulns. QuartzCore lets you create arbitrary files with X_LOG_FILE. might be able to make a TCC bypass or something with it, i haven't checked. fun fact: it also used to put this var directly into a call to system()