Explore >> Select a destination


You are here

andrewkelley.me
| | kristoff.it
15.9 parsecs away

Travel
| | Let's take a quick look at what compile-time execution looks like in Zig.
| | hondu.co
15.1 parsecs away

Travel
| | Some weeks ago I started doing a side project in C. It didn't do really complex stuff, but still, I was struggling with some "core" C stuff, namely pointers!
| | ciesie.com
11.5 parsecs away

Travel
| | Today I've played around with Zig, the new, hip (is it hip?) programming language. I find it pretty neat. I'm going to walk you (and myself) through my first, very short, piece of code. Below you can see the entirety of it. It basically allocates a 2MB buffer and reads a file into it... Yep, not particularly impressive, but this is a judgment free, learning zone, ok?! 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 const std = @import("std"); const warn = @import("std").
| | positive.security
49.5 parsecs away

Travel
| Chaining a misconfiguration in IE11/Edge Legacy with an argument injection in a Windows 10/11 default URI handler and a bypass for a previous Electron patch, we developed a drive-by RCE exploit for Windows 10. The main vulnerability in the ms-officecmd URI handler has not been patched yet and can also be triggered through other browsers (requires confirmation of an inconspicuous dialog) and desktop applications that allow URI opening.