Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ

100 posts

Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ banner
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ

Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ

@lanleft_

she/her | coffee delivery at Qrious Secure @qriousec |

Vietnam ๊ฐ€์ž…์ผ Eylรผl 2019
459 ํŒ”๋กœ์ž‰1.4K ํŒ”๋กœ์›Œ
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ ๋ฆฌํŠธ์œ—ํ•จ
Qrious Secure
Qrious Secure@qriousecยท
One Repo x Codex/Claude Code/Cursor! by @trichimtrich
Portuguรชs
0
4
39
8.6K
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ ๋ฆฌํŠธ์œ—ํ•จ
Toan Pham
Toan Pham@__sutoยท
Not a single LLM can correctly explain the root cause even given the crash poc of this bug, let alone talk about how to write the exploit code. Kudo @lanleft_ for her great works! We may publish writeup when it no longer hot.
Qrious Secure@qriousec

@lanleft_ has convinced firefox GC to give her a shell ๐Ÿคช

English
3
2
94
9.3K
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ ๋ฆฌํŠธ์œ—ํ•จ
pr0cf5
pr0cf5@pr0cf51ยท
Last month, I gave a talk at @POC_Crew about ATLANTIS and the tech behind our #AIxCC win. We dove into competition details, using LLMs for deep bug discovery, and what's next for AI in security. github.com/pr0cf5/talks/bโ€ฆ
English
0
18
87
6.5K
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ ๋ฆฌํŠธ์œ—ํ•จ
cts๐ŸŒธ
cts๐ŸŒธ@gf_256ยท
crazy find at the huawei store
English
131
388
9K
540.5K
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ ๋ฆฌํŠธ์œ—ํ•จ
Years Progress
Years Progress@YearsProgressยท
2025 is 91% complete.
Years Progress tweet media
English
25
737
3.7K
107.9K
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ ๋ฆฌํŠธ์œ—ํ•จ
stephen
stephen@_tsuroยท
If you like Chrome IPC shenanigans like this, you might also enjoy my talk from black hat 25: youtu.be/qhhJCLy0YBA?siโ€ฆ
YouTube video
YouTube
xvonfers@xvonfers

Whoah... $250000 (CVE-2025-4609, similar to CVE-2025-2783/412578726)[412578726][Mojo][IpczDriver]ipcz bug -> renderer duplicate browser process handle -> escape sbx is now open with PoC & exploit(success rate is nearly 70%-80%) issues.chromium.org/issues/4125787โ€ฆ #comment11" target="_blank" rel="nofollow noopener">issues.chromium.org/issues/4125787โ€ฆ

English
3
35
225
37.4K
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ ๋ฆฌํŠธ์œ—ํ•จ
Samuel GroรŸ
Samuel GroรŸ@5aeloยท
We released our Fuzzilli-based V8 Sandbox fuzzer: github.com/googleprojectzโ€ฆ It explores the heap to find interesting objects and corrupts them in a deterministic way using V8's memory corruption API. Happy fuzzing!
English
2
74
294
24.1K
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ ๋ฆฌํŠธ์œ—ํ•จ
Off-By-One Conference
Off-By-One Conference@offbyoneconfยท
Singapore - shout it out for Yuki Chen ๐Ÿคฉ !!! Bringing Day 1 of @offbyoneconf 2025 to a explosive end with ๐€ ๐‰๐จ๐ฎ๐ซ๐ง๐ž๐ฒ ๐ข๐ง๐ญ๐จ ๐–๐ข๐ง๐๐จ๐ฐ๐ฌ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐’๐ฎ๐ฉ๐ฉ๐จ๐ซ๐ญ ๐๐ซ๐จ๐ฏ๐ข๐๐ž๐ซ ๐ˆ๐ง๐ญ๐ž๐ซ๐Ÿ๐š๐œ๐ž. ๐Ÿ™‡๐Ÿ™‡๐Ÿ™‡
Off-By-One Conference tweet mediaOff-By-One Conference tweet mediaOff-By-One Conference tweet media
English
11
5
36
11.8K
Bien ๐Ÿ‡ป๐Ÿ‡ณ
Bien ๐Ÿ‡ป๐Ÿ‡ณ@bienpnnยท
@lanleft_ @tacbliw the point is the book is about exploitation, i'm not talking about finding vuln so please don't downplay yourself. exploiting is an art by itself already
English
1
0
4
194
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ@lanleft_ยท
@bienpnn @tacbliw no no no, not completely, I've only worked on the exploitation part so far, haven't found any vulnerability by myself yet, might be lack of this fundamenetal knowledge :D
English
1
0
1
139
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ@lanleft_ยท
@tacbliw My friend gave me this book, I ended up quickly after first chapter and never picked it up again. It still sits untouched on my bookshelf xD
English
1
0
0
115
wildcat
wildcat@tacbliwยท
@LiveOverflow For me it was the opposite. I read the first chapter, didnโ€™t understand shit. Encouraged to learn more. Now I do binary exploit for a living, this book is still on my pc desktop to remind me to keep learing more ๐Ÿ‘€
English
1
0
6
1.1K
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ ๋ฆฌํŠธ์œ—ํ•จ
Qrious Secure
Qrious Secure@qriousecยท
Qrious Secure tweet media
ZXX
1
1
21
7.6K
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ ๋ฆฌํŠธ์œ—ํ•จ
Qrious Secure
Qrious Secure@qriousecยท
Santa gave us freshly new JSC 0day โœŒ๏ธ
Qrious Secure tweet media
English
2
4
95
14.4K
Lan Vu ๐Ÿ‡ป๐Ÿ‡ณ ๋ฆฌํŠธ์œ—ํ•จ
Qrious Secure
Qrious Secure@qriousecยท
Our teammate @__suto has just pwned V8 JavaScript engine on Google's V8CTF version M120 using a 0-day exploit.
Qrious Secure tweet media
English
0
3
38
5K