HackSys Team

10.2K posts

HackSys Team

HackSys Team

@HackSysTeam

Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning

India 参加日 Eylül 2012
639 フォロー中10.4K フォロワー
固定されたツイート
HackSys Team
HackSys Team@HackSysTeam·
🚨 We're hiring! 🚨 Hi everyone! HackSys Inc. is seeking an enthusiastic **Vulnerability Researcher** (Windows/Android/Browser) to join our team full-time — here in India! 🇮🇳🛡️ 👀 What we’re looking for: - Approximately **2+ years of experience** in hands-on vulnerability research - Strong understanding of **vulnerability classes**, C/C++/ASM - You've experimented with or exploited **n-days** on Windows, Android, or browsers - Reverse engineering capabilities using software such as **WinDbg, IDA, Ghidra** - Above all — a **true passion for breaking things to know them** 🔥 You live, eat, and breathe VR (the security variety 😉), we'd love to speak with you. 📬 Simply DM **@HackSysTeam** on Twitter or Discord for more information or to apply! #Hiring #CyberSecurity #VulnerabilityResearch #InfoSec #HackThePlanet
English
4
7
22
7.5K
HackSys Team がリツイート
esjay
esjay@esj4y·
Here are the slides for my Scudo talk yesterday for the MobileHackingLab Con: github.com/3sjay/talks/bl… it has two extra slides I haven't addressed in my talk. One describing two common misconceptions and one showing the shuffle count for each class.
English
2
9
64
6.1K
HackSys Team がリツイート
Alexandre Becholey
Alexandre Becholey@0xabe_io·
Started a blog series on writing a minimal ARM hypervisor from scratch — boots as a UEFI app, claims EL2, identity-maps everything through Stage 2. Chapter 0 just dropped: ARM vs x86 virtualization, UEFI internals, EDK2 setup, first app at EL2. 0xabe.io/hypervisor/arm…
English
2
52
230
12.7K
HackSys Team がリツイート
Alisa Esage Шевченко
While y’all discounting your mediocre courses, @zerodaytraining is doubling down on my pro offers: - Foundations + Hypervisor = Escape Bundle (new) - Foundations + Browser = Remote Bundle (new) - Foundations + Hypervisor + Browser = Elite Bundle (new) That’s a full roadmap from zero to zero day engineer.
Zero Day Engineering@zerodayalpha

Winter Bundles are here ✨🎄✨ Bundles are one of our most requested features. Today, we've put together our best self-paced trainings to keep one's head cool on Christmas and well into 2026. Limited availability through mid January Details: zerodayengineering.com/winter-deals.h…

English
1
12
74
18.5K
HackSys Team がリツイート
chompie
chompie@chompie1337·
Watch XOR’s talk CUDA de Grâce: Owning AI Cloud Infrastructure with GPU exploits Kernel + driver bugs aren’t just a LPE problem, they’re a cloud problem. With the explosion of AI in the cloud, NVIDIA’s GPU drivers have become a valuable attack surface youtu.be/Lvz2_ZHj3lo
YouTube video
YouTube
English
5
74
296
50.7K
HackSys Team がリツイート
Bruce Chen
Bruce Chen@bruce30262·
Made a pwn challenge for this year’s HITCON CTF, which required participants to bypass PAC, BTI, and deal with relative vtables. Here’s the write-up: bruce30262.github.io/hitcon-ctf-202… Check it out if you're interested🙂
English
0
44
195
14.4K
HackSys Team がリツイート
Ben
Ben@XploitBengineer·
I posted a short blog about how a Samsung GPU vulnerability (CVE-2025-21479) can be leveraged for an LPE on affected devices xploitbengineer.github.io/CVE-2025-21479
English
6
80
255
29.4K
HackSys Team がリツイート
D4m0n
D4m0n@d4m0n_8·
It’s time to publish the blog post about the bug that won at P2O Berlin 2025. Enjoy! With this post, I mark my last moment as a researcher at @oobs_io. I’m moving on to a new place for a fresh start.🔥🦎 oobs.io/posts/four-byt…
English
1
62
187
19.6K
HackSys Team
HackSys Team@HackSysTeam·
@S4fv4nP @_c0c0n_ Appreciate it! Glad you enjoyed the session and huge congrats on winning the CTF! 👏🔥
English
0
0
1
250
HackSys Team がリツイート
Safvan P
Safvan P@S4fv4nP·
Recently attended an amazing Windows Kernel Exploitation training at @_c0c0n_ by @HackSysTeam's Ashfaq Ansari! 🔥 Ashfaq was an incredible trainer - made complex kernel concepts easy to grasp. Also won the CTF! 🏆 Big thanks to Ashfaq and HackSysTeam! 🙏
English
1
1
4
964
HackSys Team がリツイート
Crowdfense
Crowdfense@crowdfense·
Bidding farewell to one of the last Windows kernel address leaks, CVE-2025-53136 (KASLR bypass). Sometimes, even patches can open new doors for exploitation. crowdfense.com/nt-os-kernel-i…
English
1
29
84
21.6K
HackSys Team がリツイート
Qrious Secure
Qrious Secure@qriousec·
Check out our newest blog about how we took advantage of a WebGPU feature to turn an integer underflow bug into an arbitrary read in Chrome’s WebGPU. This bug was fixed by Google long ago, but our ticket is still restricted. qriousec.github.io/post/oob-angle/ by @lanleft_ + @__suto
English
2
35
156
22.5K
HackSys Team がリツイート
Pumpkin 🎃
Pumpkin 🎃@u1f383·
Last weekend, I participated in corCTF and solved the Android Pwn challenge - corphone. It was a great challenge, and I learned a lot from it. Here's my write-up :) u1f383.github.io/android/2025/0…
English
1
53
233
19.9K
HackSys Team がリツイート
Alexander Popov
Alexander Popov@a13xp0p0v·
My new article: "Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel"⚡️ I tell a bug collision story and introduce my pet project kernel-hack-drill, which helped me to exploit the hard bug that received @PwnieAwards 2025 a13xp0p0v.github.io/2025/09/02/ker…
Alexander Popov tweet mediaAlexander Popov tweet media
English
4
85
260
34K