Kevin.m

1.1K posts

Kevin.m banner
Kevin.m

Kevin.m

@klmitchell212

Mobile Security and Bug Bounty @Amazon | prev: iOS Engineer (@Accenture, @StateFarm, @Allstate) | GH: klmitchell2

Milwaukee, WI انضم Şubat 2016
1.4K يتبع535 المتابعون
Kevin.m أُعيد تغريده
Nikias Bassen
Nikias Bassen@pimskeks·
Are you an iOS security ninja looking for your next challenge? Join us at @Zimperium and @zLabsProject to help build the future of mobile security. We’re hiring iOS detection researchers/security engineers — apply here: jobs.lever.co/zimperium/ff0d…
English
1
5
48
4.3K
Kevin.m أُعيد تغريده
Calif
Calif@calif_io·
Learning to Jailbreak an iPhone with Claude (Part 1) Claude helped me take apart an iOS Safari exploit, and retune it for my Mac. It even wrote its own variant. open.substack.com/pub/calif/p/le…
English
2
57
263
31.6K
Kevin.m أُعيد تغريده
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️An iOS exploit and C2 integrated attack panel called "iExploit Lab v1.0" is being advertised on a popular cybercrime forum, targeting iOS 13 through iOS 17.2.1 for $15,000. ‣ Threat Actor: OnarDev ‣ Category: Exploit / Tool ‣ Name: iExploit Lab v1.0 ‣ Target: iOS 13 to iOS 17.2.1 ‣ Developer: Zero Bound Workshop team iExploit Lab is a visualized attack panel integrating C2 operations based on recent research on high-risk iOS vulnerabilities. It is not a traditional remote control tool but instead attacks iOS systems when a user visits a link via Safari. Attack stages: ▪️ Stage 1 - Browser Attack (Stage1 terrorbird / Stage1 cassowary) ▪️ Stage 2 - PAC Bypass (Stage2 seedbell) ▪️ Stage 3 - Kernel Privilege Escalation (Stage3 Variant A / Stage3 Variant B) Capabilities: ▪️ Break through system isolation and access all data on device ▪️ Theft of cryptocurrencies and bank information ▪️ Integrated HTTP vulnerability web server and C2 remote control server ▪️ Attack link auto-generated after server startup ▪️ Link delivered via social engineering, AirDrop, or other methods (one-click via Safari) ▪️ Connected device management panel ▪️ Operator console with real-time logging The panel UI is in Chinese with a 5-step operational workflow: modify configuration, start services, set up connection, wait for callback, and control device. The actor notes that the two iOS 26 versions have already been patched. Proxy mode is available for earning dividends.
Dark Web Informer tweet mediaDark Web Informer tweet mediaDark Web Informer tweet media
English
6
30
174
25.1K
Kevin.m أُعيد تغريده
johnny
johnny@zeroxjf·
Another new/distinct bug in AJPG driver 💀 At this rate my whole timeline will just be panic logs
johnny tweet media
English
6
5
92
6K
Kevin.m أُعيد تغريده
pwn.ai
pwn.ai@pwn_ai·
Today we’re announcing something new in offensive security: the first AI system for novel vulnerability class discovery. An architecture built to discover undocumented exploit-building behaviors and previously unknown novel attack vectors that can later yield zero-days across real-world targets. The Search for AGI through Security is here. Read more: pwn.ai/blog/the-searc…
pwn.ai tweet media
English
5
19
128
26.2K
Kevin.m أُعيد تغريده
ゆ
@verd1c_·
Turns out that given enough MCP tools for undetected process R/W without frida/hooking, Opus was able to oneshot an undetected ESP for PUBG mobile in a few hours :) Will write it up some time, definitely a new era in the anti-cheat cat & mouse game
ゆ tweet mediaゆ tweet media
English
15
39
722
45.2K
Kevin.m أُعيد تغريده
johnny
johnny@zeroxjf·
One part of using AI to find vulns is I literally find so much stuff I lose track at times. CVE-2026-20687 was issued in response to an AppleJPEGDriver UAF I found, but I just rediscovered a derivative of that initial bug in a harness I built, and it’s still present in iOS 26.4.1
johnny tweet media
English
2
15
139
10.8K
Kevin.m أُعيد تغريده
Dimitri Os
Dimitri Os@Ch0pin·
We identified a serious security vulnerability in an SDK, use by many wallets. Read about it here: microsoft.com/en-us/security…
English
0
3
14
1.1K
Kevin.m أُعيد تغريده
johnny
johnny@zeroxjf·
LightSaber (iOS 18) v0.0.93 - new features: • bypass 3-app limit for free dev accounts (re-run after each set of 3 apps) • MobileGestalt patcher (use caution, no computer required) • syslog script for live USB chain debugging (example log in repo) zeroxjf.github.io/lightsaber
English
11
21
105
15.6K
Kevin.m أُعيد تغريده
roooot
roooot@rooootdev·
For everyone who cares, Lara now has the 3 App Bypass fully working! github.com/rooootdev/lara
English
15
39
216
33.8K
Kevin.m أُعيد تغريده
Ben James
Ben James@BenJames_____·
I made a USB-Clawd who gets my attention when Claude Code finishes a response
English
421
1.3K
19.8K
1.3M
Kevin.m أُعيد تغريده
johnny
johnny@zeroxjf·
Apple's bug bounty portal is such a poorly coded mess (how ironic) that I completely missed getting a second CVE credited with iOS 26.3!
johnny tweet media
English
5
7
97
9.3K
Kevin.m أُعيد تغريده
lcamtuf
lcamtuf@lcamtuf·
Frankly, I'm appalled by the prospect of LLMs taking offensive security research jobs from honest, hard-working fuzzers
English
5
71
401
45.8K
Kevin.m أُعيد تغريده
Gergely Orosz
Gergely Orosz@GergelyOrosz·
This is either brilliant or scary: Anthropic accidentally leaked the TS source code of Claude Code (which is closed source). Repos sharing the source are taken down with DMCA. BUT this repo rewrote the code using Python, and so it violates no copyright & cannot be taken down!
Gergely Orosz tweet media
English
447
1.2K
12.9K
2.2M
Kevin.m أُعيد تغريده
Leonid Volkov
Leonid Volkov@leonidvolkov·
I received a suspicious email with a weird link yesterday. My first thought was this is yet another phishing attempt, albeit well-tailored. I was wrong: researchers with whom I shared this email told me I was targeted by a very recent DarkSword attack used by the GRU. If I were to click the link in that email, my phone would be compromised — without entering any passwords or doing anything else. Fun fact: the attack would be launched only if I would access the link using an iPhone registered in Lithuania (which is indeed my case). Luckily, I didn’t click. Beware! Technical details about this exploit and how to stay protected: cloud.google.com/blog/topics/th…
Leonid Volkov tweet media
English
38
388
1.3K
227.8K
Kevin.m أُعيد تغريده
johnny
johnny@zeroxjf·
After much trial and error, proud to show off tweak injection on iOS 18; possibly for the first time ever? DarkSword injection into SpringBoard on iPhone 15 Pro Max running 18.6.2 🎉
English
35
44
373
37.1K