frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Seedance2 – multi-shot AI video generation

https://www.genstory.app/story-template/seedance2-ai-story-generator
1•RyanMu•3m ago•1 comments

Πfs – The Data-Free Filesystem

https://github.com/philipl/pifs
1•ravenical•6m ago•0 comments

Go-busybox: A sandboxable port of busybox for AI agents

https://github.com/rcarmo/go-busybox
1•rcarmo•7m ago•0 comments

Quantization-Aware Distillation for NVFP4 Inference Accuracy Recovery [pdf]

https://research.nvidia.com/labs/nemotron/files/NVFP4-QAD-Report.pdf
1•gmays•8m ago•0 comments

xAI Merger Poses Bigger Threat to OpenAI, Anthropic

https://www.bloomberg.com/news/newsletters/2026-02-03/musk-s-xai-merger-poses-bigger-threat-to-op...
1•andsoitis•8m ago•0 comments

Atlas Airborne (Boston Dynamics and RAI Institute) [video]

https://www.youtube.com/watch?v=UNorxwlZlFk
1•lysace•9m ago•0 comments

Zen Tools

http://postmake.io/zen-list
1•Malfunction92•11m ago•0 comments

Is the Detachment in the Room? – Agents, Cruelty, and Empathy

https://hailey.at/posts/3mear2n7v3k2r
1•carnevalem•12m ago•0 comments

The purpose of Continuous Integration is to fail

https://blog.nix-ci.com/post/2026-02-05_the-purpose-of-ci-is-to-fail
1•zdw•14m ago•0 comments

Apfelstrudel: Live coding music environment with AI agent chat

https://github.com/rcarmo/apfelstrudel
1•rcarmo•15m ago•0 comments

What Is Stoicism?

https://stoacentral.com/guides/what-is-stoicism
3•0xmattf•15m ago•0 comments

What happens when a neighborhood is built around a farm

https://grist.org/cities/what-happens-when-a-neighborhood-is-built-around-a-farm/
1•Brajeshwar•16m ago•0 comments

Every major galaxy is speeding away from the Milky Way, except one

https://www.livescience.com/space/cosmology/every-major-galaxy-is-speeding-away-from-the-milky-wa...
2•Brajeshwar•16m ago•0 comments

Extreme Inequality Presages the Revolt Against It

https://www.noemamag.com/extreme-inequality-presages-the-revolt-against-it/
2•Brajeshwar•16m ago•0 comments

There's no such thing as "tech" (Ten years later)

1•dtjb•17m ago•0 comments

What Really Killed Flash Player: A Six-Year Campaign of Deliberate Platform Work

https://medium.com/@aglaforge/what-really-killed-flash-player-a-six-year-campaign-of-deliberate-p...
1•jbegley•17m ago•0 comments

Ask HN: Anyone orchestrating multiple AI coding agents in parallel?

1•buildingwdavid•19m ago•0 comments

Show HN: Knowledge-Bank

https://github.com/gabrywu-public/knowledge-bank
1•gabrywu•24m ago•0 comments

Show HN: The Codeverse Hub Linux

https://github.com/TheCodeVerseHub/CodeVerseLinuxDistro
3•sinisterMage•25m ago•2 comments

Take a trip to Japan's Dododo Land, the most irritating place on Earth

https://soranews24.com/2026/02/07/take-a-trip-to-japans-dododo-land-the-most-irritating-place-on-...
2•zdw•25m ago•0 comments

British drivers over 70 to face eye tests every three years

https://www.bbc.com/news/articles/c205nxy0p31o
35•bookofjoe•26m ago•12 comments

BookTalk: A Reading Companion That Captures Your Voice

https://github.com/bramses/BookTalk
1•_bramses•27m ago•0 comments

Is AI "good" yet? – tracking HN's sentiment on AI coding

https://www.is-ai-good-yet.com/#home
3•ilyaizen•28m ago•1 comments

Show HN: Amdb – Tree-sitter based memory for AI agents (Rust)

https://github.com/BETAER-08/amdb
1•try_betaer•28m ago•0 comments

OpenClaw Partners with VirusTotal for Skill Security

https://openclaw.ai/blog/virustotal-partnership
2•anhxuan•28m ago•0 comments

Show HN: Seedance 2.0 Release

https://seedancy2.com/
2•funnycoding•29m ago•0 comments

Leisure Suit Larry's Al Lowe on model trains, funny deaths and Disney

https://spillhistorie.no/2026/02/06/interview-with-sierra-veteran-al-lowe/
1•thelok•29m ago•0 comments

Towards Self-Driving Codebases

https://cursor.com/blog/self-driving-codebases
1•edwinarbus•29m ago•0 comments

VCF West: Whirlwind Software Restoration – Guy Fedorkow [video]

https://www.youtube.com/watch?v=YLoXodz1N9A
1•stmw•30m ago•1 comments

Show HN: COGext – A minimalist, open-source system monitor for Chrome (<550KB)

https://github.com/tchoa91/cog-ext
1•tchoa91•31m ago•1 comments
Open in hackernews

Book: Advanced Windows Exploitation and Defense: A Bottom-Up Approach

https://zenodo.org/records/17238056
1•thevieart•4mo ago

Comments

thevieart•4mo ago
This book provides a comprehensive and systematic analysis of modern cybersecurity threats within the Windows ecosystem, focusing on a "bottom-up" defensive philosophy. It deconstructs the anatomy of vulnerabilities by contrasting traditional code-based exploits, such as Buffer Overflow and Use-After-Free, with sophisticated architectural exploits that abuse legitimate system design. Using the "exploitation path" framework—consisting of an entry point, propagation path, and impact—the text meticulously examines how attackers leverage system mechanisms at every layer, from userland to the kernel and firmware, to achieve stealth and persistence.

The analysis begins with an in-depth exploration of user-mode evasion techniques. It details how

direct syscalls (Chapter 2) bypass Endpoint Detection and Response (EDR) API hooking by invoking kernel services directly, with methods for dynamically resolving syscall numbers to ensure cross-version compatibility. It further investigates advanced process manipulation tactics (Chapter 3), including classic process hollowing, modern memory rebinding, and threadless execution, which allow malicious code to masquerade as legitimate processes. Complementing these techniques, the book explores sophisticated memory obfuscation (Chapter 4), introducing concepts like "nano-entropy pulses" to maintain low data randomness (0.3–0.8 bits/byte) and the creation of "spoofed PE sections" to deceive forensic tools.

Ascending to the deepest layers of the system, the text uncovers architectural blind spots within the Windows kernel. It dissects exploits that abuse the

Interrupt Request Level (IRQL) architecture (Chapter 5), demonstrating how hooking Interrupt Service Routines (ISRs) enables code execution at high-priority levels where monitoring tools are paused. The analysis extends to the use of Memory-Mapped I/O (MMIO) as the "ultimate hiding place" (Chapter 6), where attackers store code in hardware-reserved memory regions that are typically unscanned by security software. The pinnacle of persistence is explored through UEFI/SPI flash code injection (Chapter 7), an "immortal" technique that survives OS reinstalls, and the abuse of System Management Mode (SMM) (Chapter 8) as an "invisible orchestrator" operating at a privilege level higher than the kernel itself.

The book then pivots to covert Command and Control (C2) channels that evade network-based detection. It details how internal telemetry mechanisms like

Event Tracing for Windows (ETW) and Windows Notification Facility (WNF) are repurposed for stealthy, network-less communication (Chapter 9). Furthermore, it analyzes the abuse of common administrative protocols, including DNS tunneling, SMB named pipes, and WMI event subscriptions, enhanced with modern obfuscation like Base32 encoding and polymorphic patterns (Chapter 10). Advanced network traffic obfuscation techniques such as domain fronting and anti-entropy beaconing are also examined, highlighting their effectiveness in blending with encrypted TLS 1.3 traffic (Chapter 11)

Concluding with a forward-looking perspective on defense, the book proposes a new detection philosophy centered on

weak signal correlation (Chapter 12), arguing that modern threats require correlating low-confidence indicators from multiple telemetry sources (ETW, Sysmon, NTA) rather than relying on single, high-confidence alerts. A practical, step-by-step endpoint hardening roadmap is provided (Chapter 13), applying the "bottom-up" approach to secure systems from firmware to userland using built-in Windows features and specialized tools.

wwusu•4mo ago
Uuuyy