My favorite Discworld book is his last, The Shepherd’s Crown. After doing the whole library, I felt it ending well. Then you read the afterword by Rob Wilkins… you get all the feels.
I hate Google photos because I feel it’s too invasive with that cloud backup that you never really know if a photo is online or on device, so I disabled it in my Google Pixel....
Is there a setting to default all external links to a new tab? I’m used to that behavior from infosec.exchange. I keep finding myself having to reopen infosec.pub after going down a rabbit hole.
Hi everyone. I’m looking for my next book (or series) to read but I’m in the mood for a particular theme. I’m hoping you all can assist with some recommendations....
Callisto is an intelligent automated binary vulnerability analysis tool. Its purpose is to autonomously decompile a provided binary and iterate through the psuedo code output looking for potential security vulnerabilities in that pseudo c code. Ghidra’s headless decompiler is what drives the binary decompilation and analysis...
A decompiler-unified plugin by Zion Basque that leverages the OpenAI API to enhance your decompilation process by offering function identification, function summarisation and vulnerability detection. The plugin currently supports IDA, Binja and Ghidra....
Codex Decompiler is a Ghidra plugin that utilizes OpenAI’s models to improve the decompilation and reverse engineering experience. It currently has the ability to take the disassembly from Ghidra and then feed it to OpenAI’s models to decompile the code. The plugin also offers several other features to perform on the...
In this post, I introduce a new Ghidra script that elicits high-level explanatory comments for decompiled function code from the GPT-3 large language model. This script is called G-3PO. In the first few sections of the post, I discuss the motivation and rationale for building such a tool, in the context of existing automated...
LLDB plugin which queries OpenAI’s davinci-003 language model to speed up reverse-engineering. Treat it like an extension of Lisa.py, an Exploit Dev Swiss Army Knife....
Automated Audit Log Forensic Analysis (ALFA) for Google Workspace is a tool to acquire all Google Workspace audit logs and perform automated forensic analysis on the audit logs using statistics and the MITRE ATT&CK Cloud Framework....
Hi all! I have been using Emby for about a year now, but I was wondering, after the recent botnet debacle with Emby, if I should switch my media provider....
I’ve been running Plex for years (maybe a decade or more). Yes, there are a bunch of mainstream-ish features that I don’t use. It’s still simple for everyone in my family (including older parents) to navigate and use. I use it for movies, TV, and it runs a photo screen saver with family pics.
What book(s) are you currently reading? 03 August
I finished Fool Moon by Jim Butcher, and started The Last White Man by Mohsin Hamid. It’s a thin book, and I am almost at the end....
Google camera requires Google photos, is there any workaround?
I hate Google photos because I feel it’s too invasive with that cloud backup that you never really know if a photo is online or on device, so I disabled it in my Google Pixel....
JumpCloud, an IT firm serving 200,000 orgs, says it was hacked by nation-state (arstechnica.com)
“Extremely targeted” attack involved a data injection into JumpCloud’s commands framework.
Never do this! (i.imgur.com)
Feature Request: Open external links in new tab
Is there a setting to default all external links to a new tab? I’m used to that behavior from infosec.exchange. I keep finding myself having to reopen infosec.pub after going down a rabbit hole.
Looking For Something to Read
Hi everyone. I’m looking for my next book (or series) to read but I’m in the mood for a particular theme. I’m hoping you all can assist with some recommendations....
GitHub - JetP1ane/Callisto: Callisto - An Intelligent Binary Vulnerability Analysis Tool (github.com)
Callisto is an intelligent automated binary vulnerability analysis tool. Its purpose is to autonomously decompile a provided binary and iterate through the psuedo code output looking for potential security vulnerabilities in that pseudo c code. Ghidra’s headless decompiler is what drives the binary decompilation and analysis...
GitHub - mahaloz/DAILA: A decompiler-unified plugin for accessing the OpenAI API to improve your decompilation experience (github.com)
A decompiler-unified plugin by Zion Basque that leverages the OpenAI API to enhance your decompilation process by offering function identification, function summarisation and vulnerability detection. The plugin currently supports IDA, Binja and Ghidra....
GitHub - trailofbits/Codex-Decompiler (github.com)
Codex Decompiler is a Ghidra plugin that utilizes OpenAI’s models to improve the decompilation and reverse engineering experience. It currently has the ability to take the disassembly from Ghidra and then feed it to OpenAI’s models to decompile the code. The plugin also offers several other features to perform on the...
G-3PO: A Protocol Droid for Ghidra (medium.com)
In this post, I introduce a new Ghidra script that elicits high-level explanatory comments for decompiled function code from the GPT-3 large language model. This script is called G-3PO. In the first few sections of the post, I discuss the motivation and rationale for building such a tool, in the context of existing automated...
GitHub - ant4g0nist/polar: A LLDB plugin which queries OpenAI's davinci-003 language model to explain the disassembly (github.com)
LLDB plugin which queries OpenAI’s davinci-003 language model to speed up reverse-engineering. Treat it like an extension of Lisa.py, an Exploit Dev Swiss Army Knife....
ALFA: Automated Audit Log Forensic Analysis for Google Workspace (github.com)
Automated Audit Log Forensic Analysis (ALFA) for Google Workspace is a tool to acquire all Google Workspace audit logs and perform automated forensic analysis on the audit logs using statistics and the MITRE ATT&CK Cloud Framework....
InfoSec Podcasts?
Gotta hand it to the guys over at risky.biz, it seems like they are producing so much great content that I can't get enough of it....
Container security fundamentals series (securitylabs.datadoghq.com)
cross-posted from: infosec.pub/post/86834...
Introduce yourself!
Hey everyone! Since we’re creating a new community here, I’d love to hear who’s here....
Plex, Emby, or Jellyfin
Hi all! I have been using Emby for about a year now, but I was wondering, after the recent botnet debacle with Emby, if I should switch my media provider....
Integrations with Mastodon?
Hey everyone. I just joined and am a current member over at infosec.exchange. Is there any good way to leverage Mastodon in Lemmy, or visa-versa?
Hacker drains Russian special services wallets, transfers funds to Ukraine (web.archive.org)
Regardless of your political beliefs, this is the future.