Posted: Aug 7, 2023
Ken Schutte
Analysis
Programming
Python
C
As the name implies and the example demonstrates, simply importing the module swap_8_9 has swapped the values of the two integers, 8 and 9. This can come as a surprise if you view Python's import as simply a way to introduce some name(s) into the local namespace. In fact, import can execute arbitrary code and some code can cause unexpected (or unwanted) behavior in the Python interpreter. Read More
Posted: Aug 2, 2023
Maia Arson Crimew
Security
Infosec
Analysis
a few days ago an anonymous (the adjective, not the hacking collective) group of researchers reached out to me regarding a write-up they made i might be interested in covering. interestingly enough their write-up about how twitch competitor kick.com isn't very secure was hosted on a kick.com subdomain - my interest was piqued. Read More
Posted: Mar 29, 2023
NotNite
Gaming
Infosec
Analysis
This vulnerability allows an attacker to build a specially crafted mod that would execute arbitrary code on file load, abusing what is fundamentally a bug in the base engine of FFXIV. By overwriting a certain path in the game's filesystem, you could load code on game startup. Read More
Posted: Mar 13, 2023
NotNite
AI
Programming
Me and my friends reside in a comfy Discord server called The Republic of Petoria. After the leak of LLaMA, we had an idea: what if we took all of our conversations and finetuned an AI with them? Read More