|
You are here |
andrewkelley.me | ||
| | | | |
kristoff.it
|
|
| | | | | Let's take a quick look at what compile-time execution looks like in Zig. | |
| | | | |
hondu.co
|
|
| | | | | Some weeks ago I started doing a side project in C. It didn't do really complex stuff, but still, I was struggling with some "core" C stuff, namely pointers! | |
| | | | |
ciesie.com
|
|
| | | | | Today I've played around with Zig, the new, hip (is it hip?) programming language. I find it pretty neat. I'm going to walk you (and myself) through my first, very short, piece of code. Below you can see the entirety of it. It basically allocates a 2MB buffer and reads a file into it... Yep, not particularly impressive, but this is a judgment free, learning zone, ok?! 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 const std = @import("std"); const warn = @import("std"). | |
| | | | |
positive.security
|
|
| | | Chaining a misconfiguration in IE11/Edge Legacy with an argument injection in a Windows 10/11 default URI handler and a bypass for a previous Electron patch, we developed a drive-by RCE exploit for Windows 10. The main vulnerability in the ms-officecmd URI handler has not been patched yet and can also be triggered through other browsers (requires confirmation of an inconspicuous dialog) and desktop applications that allow URI opening. | ||