Tag: .NET

  • Unit 42: GoldMelody’s Hidden Chords: Initial Access Broker In-Memory IIS Modules Revealed

    Source URL: https://unit42.paloaltonetworks.com/initial-access-broker-exploits-leaked-machine-keys/ Source: Unit 42 Title: GoldMelody’s Hidden Chords: Initial Access Broker In-Memory IIS Modules Revealed Feedly Summary: An IAB campaign exploited leaked ASP.NET Machine Keys. We dissect the attacker’s infrastructure, campaign and offer takeaways for blue teams. The post GoldMelody’s Hidden Chords: Initial Access Broker In-Memory IIS Modules Revealed appeared first on Unit…

  • Simon Willison’s Weblog: Become a command-line superhero with Simon Willison’s llm tool

    Source URL: https://simonwillison.net/2025/Jul/7/become-a-command-line-superhero-with-simon-willisons-llm-tool/#atom-everything Source: Simon Willison’s Weblog Title: Become a command-line superhero with Simon Willison’s llm tool Feedly Summary: Become a command-line superhero with Simon Willison’s llm tool Christopher Smith ran a mini hackathon in Albany New York at the weekend around uses of my LLM – the first in-person event I’m aware of dedicated…

  • Simon Willison’s Weblog: I Shipped a macOS App Built Entirely by Claude Code

    Source URL: https://simonwillison.net/2025/Jul/6/macos-app-built-entirely-by-claude-code/#atom-everything Source: Simon Willison’s Weblog Title: I Shipped a macOS App Built Entirely by Claude Code Feedly Summary: I Shipped a macOS App Built Entirely by Claude Code Indragie Karunaratne has “been building software for the Mac since 2008", but recently decided to try Claude Code to build a side project: Context, a…

  • Simon Willison’s Weblog: Supabase MCP can leak your entire SQL database

    Source URL: https://simonwillison.net/2025/Jul/6/supabase-mcp-lethal-trifecta/#atom-everything Source: Simon Willison’s Weblog Title: Supabase MCP can leak your entire SQL database Feedly Summary: Supabase MCP can leak your entire SQL database Here’s yet another example of a lethal trifecta attack, where an LLM system combines access to private data, exposure to potentially malicious instructions and a mechanism to communicate data…

  • Simon Willison’s Weblog: Identify, solve, verify

    Source URL: https://simonwillison.net/2025/Jul/4/identify-solve-verify/#atom-everything Source: Simon Willison’s Weblog Title: Identify, solve, verify Feedly Summary: The more time I spend using LLMs for code, the less I worry for my career – even as their coding capabilities continue to improve. Using LLMs as part of my process helps me understand how much of my job isn’t just…

  • Simon Willison’s Weblog: awwaiid/gremllm

    Source URL: https://simonwillison.net/2025/Jul/4/gremllm/#atom-everything Source: Simon Willison’s Weblog Title: awwaiid/gremllm Feedly Summary: awwaiid/gremllm Delightfully cursed Python library by Brock Wilcox, built on top of LLM: from gremllm import Gremllm counter = Gremllm(“counter") counter.value = 5 counter.increment() print(counter.value) # 6? print(counter.to_roman_numerals()) # VI? You tell your Gremllm what it should be in the constructor, then it uses…

  • Simon Willison’s Weblog: Quoting Adam Gordon Bell

    Source URL: https://simonwillison.net/2025/Jul/3/adam-gordon-bell/#atom-everything Source: Simon Willison’s Weblog Title: Quoting Adam Gordon Bell Feedly Summary: I think that a lot of resistance to AI coding tools comes from the same place: fear of losing something that has defined you for so long. People are reacting against overblown hype, and there is overblown hype. I get that,…