Mickey Jin

296 posts

Mickey Jin banner
Mickey Jin

Mickey Jin

@patch1t

Exploring the world with my sword of debugger : )

शामिल हुए Ağustos 2013
251 फ़ॉलोइंग5.3K फ़ॉलोवर्स
पिन किया गया ट्वीट
Mickey Jin
Mickey Jin@patch1t·
Love the gifts from @Apple Product Security! ❤️❤️❤️
Mickey Jin tweet mediaMickey Jin tweet mediaMickey Jin tweet media
English
18
23
1.3K
67.2K
Kevin
Kevin@gefrorenerapfel·
@patch1t @Apple That would be a dream 😍 Are you directly at apple or are you a partnered security researcher?
English
1
0
1
1.3K
Mickey Jin
Mickey Jin@patch1t·
Love the gifts from @Apple Product Security! ❤️❤️❤️
Mickey Jin tweet mediaMickey Jin tweet mediaMickey Jin tweet media
English
18
23
1.3K
67.2K
Mickey Jin रीट्वीट किया
Natalie Silvanovich
Natalie Silvanovich@natashenka·
Today, Project Zero released a 0-click exploit chain for the Pixel 9. While it targets the Pixel, the 0-click bug and exploit techniques we used apply to most other Android devices. projectzero.google/2026/01/pixel-…
English
7
240
1K
114.8K
Mickey Jin रीट्वीट किया
Watch This Space
Watch This Space@wtsdev·
@patch1t For clarification, none of this was a collaboration. It's just the result of both of our independently (and almost coincidentally) researching the same targets.
English
1
0
1
408
Mickey Jin रीट्वीट किया
Watch This Space
Watch This Space@wtsdev·
Introducing DirtyDict. A series of vulnerabilities found by me and @patch1t. Most of this is my perspective, but Mickey did give me permission to share some details about one of his bugs. Enjoy! wts.dev/posts/dirtydic…
English
3
15
62
8.2K
Mickey Jin रीट्वीट किया
Csaba Fitzl
Csaba Fitzl@theevilbit·
🎉 My new blog post is about a PackageKit vulnerability I learned from @p1tsist1p 's blog posts. 🍎🐛macOS LPE via the .localized directory I tried convincing Apple to universally fix it with no luck. Go hunt for vulnerable pkg installers! There is a ton :-( Happy Friday! theevilbit.github.io/posts/localize…
English
3
32
130
12.6K
Mickey Jin रीट्वीट किया
Ferdous Saljooki
Ferdous Saljooki@malwarezoo·
Excited to share our research on ChillyHell, a modular macOS backdoor targeting officials in Ukraine. Check out our write-up for more details. jamf.com/blog/chillyhel…
English
2
10
32
4.8K
Mickey Jin
Mickey Jin@patch1t·
@logiruse The vulnerable API implementation also affects iOS, but it is more difficult to exploit because the mount trick doesn’t work on iOS.
English
0
0
2
117
logiruse
logiruse@logiruse·
@patch1t How does this risk affect apps on iOS?
English
1
0
0
121
Mickey Jin रीट्वीट किया
NULLCON
NULLCON@nullcon·
A tiny timing flaw in Apple’s core file-copy APIs can put millions of devices at risk 📂🍏 Despite warnings, Apple thought it was “too hard to exploit”—until Mickey Jin developed an exploit that steals secrets in privileged services 👉nullcon.net/berlin-2025/sp… #NullconBerlin2025
NULLCON tweet media
English
0
10
44
3.9K
Mickey Jin
Mickey Jin@patch1t·
@nullcon Apple: I’ve already warned you copyfile API has a vulnerability, can you catch it?
English
1
0
17
605
Mickey Jin रीट्वीट किया
msuiche
msuiche@msuiche·
🚨 New blog post: ELEGANTBOUNCER - Catch iOS 0-click exploits without having the samples. Features iOS backup forensics & messaging app scanning for iMessage, WhatsApp, Signal, Telegram & Viber attachments. 🔗 Link -> msuiche.com/posts/elegantb…
English
8
62
200
37.4K