Sam Sanoop

2.2K posts

Sam Sanoop banner
Sam Sanoop

Sam Sanoop

@snoopysecurity

segfaulting through life & learning security 📉. I also like websec, softwaresec and static analysis, prev: @snyksec,@mwrinfosecurity, @notsosecure

@gitlab 가입일 Ocak 2013
659 팔로잉618 팔로워
Sam Sanoop 리트윗함
Nebula Security
Nebula Security@nebusecurity·
Tomorrow, we’re releasing the full technical walkthrough for CVE-2026-5865, a chrome v8 0-day found by our AI security agent "Vega". More Linux kernel and Chrome 0-day writeups are coming later this month. Stay tuned, and follow our bug list for updates: nebusec.ai/buglist/
English
7
62
347
34.2K
Sam Sanoop 리트윗함
Taeyang Lee
Taeyang Lee@5unkn0wn·
This is my first Linux kernel exploit for Google kCTF, and the patch commit is now public: git.kernel.org/pub/scm/linux/… Actually, this bug was found by AI while analyzing 1-day variants, I'd like to share my approach for these AI things to find bug, and exploitation write-up later.
Taeyang Lee tweet media
English
10
104
849
90.6K
Sam Sanoop 리트윗함
vx-underground
vx-underground@vxunderground·
vx-underground tweet media
ZXX
47
540
4.4K
87.9K
Sam Sanoop 리트윗함
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
LLMs have gotten good enough at reverse engineering to recover source code from obfuscated binaries with real accuracy. So we asked the obvious next question: how fast and cheap is it to use one to build obfuscation specifically designed to beat it? We benchmarked Claude Opus 4.6 against the Tigress obfuscator across 20 targets first, to map its strengths and failure modes. 40% solve rate. Phase 3 multi-layer combos hit 0%, with cost explosions that killed the runs. Then we ran a dev/test/refine loop to build 3 purpose-built obfuscation variants targeting the same crackme, iterating directly against the model's known weaknesses. The finding: LLM-targeted obfuscation is fast and cheap to develop. Context windows, budget caps, and shortcut biases are all exploitable attack surfaces. The arms race just shifted.
Elastic Security Labs tweet media
English
4
86
320
29.8K
Sam Sanoop 리트윗함
Chaofan Shou
Chaofan Shou@Fried_rice·
Chinese LLMs can hack better than state-sponsored hackers with properly evolved harness - Kimi K2.5 managed to find and exploit 6 vulnerabilities in browsers: a single page view or an extension install by victims equal full system hijack. Check arxiv.org/abs/2604.20801
Chaofan Shou tweet media
English
47
412
2.4K
179.3K
Sam Sanoop 리트윗함
Jorian
Jorian@J0R1AN·
Cool exploit with @_0x999: He found that \x7F breaks Chrome's "Copy as cURL (cmd)" command parsing in Windows Console Host. In combination with a ", it allowed you to add any arguments to curl. With -o writing files is easy, but we need the username for the startup path... (1/2)
Jorian tweet media
English
1
51
270
24.6K
Sam Sanoop 리트윗함
xarkes
xarkes@xarkes_·
Mozilla says Mythos helped identify 271 vulnerabilities in Firefox 150. I went through the commits, CVEs, and bug links to see what that number really means. My takeaway: relax folks. xark.es/b/mythos-firef…
English
10
119
753
117.3K
Sam Sanoop 리트윗함
Markus Vervier
Markus Vervier@marver·
The RCE I've found in LiteLLM (x41-dsec.de/lab/advisories…) is a nice example of how AI agents can speed up security research. The issue was found during a project with high time constraints by me manually. So I had a Nemesis (@Persistent_Psi) backed AI agent do auto-triage and find a sandbox escape fully automated. After 20 minutes the job was done including a fully working exploit. This highlights again that the time to exploit and exploit creation and generation is decreasing dramatically. On the upside, this means that hiding details on advisories or sneakily releasing silent patches for security issues became less effective!
English
2
18
61
4.6K
Sam Sanoop 리트윗함
Trail of Bits
Trail of Bits@trailofbits·
Language-level bug classes, stdlib pitfalls, Linux and Windows issues from usermode to kernel, seccomp sandbox escapes. One checklist, hundreds of checks. appsec.guide/docs/languages…
English
2
28
127
12.8K
Sam Sanoop 리트윗함
Alex Kuleshov
Alex Kuleshov@0xAX·
Took me almost a month, but it’s finally done. I completely rewrote the first chapter of linux-insides about the Linux kernel initialization process. Now it should be aligned with modern kernels (up to master). github.com/0xAX/linux-ins…
English
11
222
1.3K
52.1K
Sam Sanoop 리트윗함
PwnFuzz
PwnFuzz@pwnfuzz·
An automated N-day research pipeline at PwnFuzz. Ghidra + Ollama + n8n →Diffs Patch Tuesday binaries → LLM analyzes the output → Structured vuln reports, monthly AI-generated reports gets you oriented fast! Blog: ghostbyt3.github.io/blog/nday-rese… Repo: github.com/ghostbyt3/nday…
PwnFuzz tweet media
English
0
115
493
26.3K
Sam Sanoop 리트윗함
Assetnote
Assetnote@assetnote·
Reverse engineering large enterprise apps means wading through hundreds of vendor dependencies. We got tired of it, so we built Hyoketsu to fix it - open source, with a pre-calculated 13GB NuGet + Maven hash database. GitHub: github.com/assetnote/hyok…: slcyber.io/research-cente…
English
0
9
38
2.5K
Sam Sanoop 리트윗함
clem 🤗
clem 🤗@ClementDelangue·
Our biggest open-source repos are getting overwhelmed by AI slop which literally makes Github unusable (~a new pull request every 3 minutes). Fun new challenges in an agentic world!
clem 🤗 tweet media
English
164
107
1.3K
207.5K
Sam Sanoop 리트윗함
Alex Plaskett
Alex Plaskett@alexjplaskett·
ZeroDayBench: Evaluating LLM Agents on Unseen Zero-Day Vulnerabilities for Cyberdefense arxiv.org/pdf/2603.02297
Alex Plaskett tweet mediaAlex Plaskett tweet mediaAlex Plaskett tweet media
English
3
41
189
19.2K
Sam Sanoop 리트윗함
OtterSec
OtterSec@osec_io·
We achieved a guest-to-host escape by exploiting a QEMU 0-day where the bytes written out of bounds were uncontrolled. Full breakdown of the technique, glibc allocator behavior, and our heap spray/RIP-control primitive ↓
OtterSec tweet media
English
7
113
551
47.6K
Sam Sanoop 리트윗함
Trail of Bits
Trail of Bits@trailofbits·
Over 700,000 repos ship crypto libraries that default to a static IV, creating widespread key reuse. We also released mquire, a Linux memory forensics tool, and added 12 new open-source Claude Code skills for security engineering. March Tribune: mailchi.mp/trailofbits/ma…
English
7
13
96
14.2K
Sam Sanoop 리트윗함
Greed
Greed@0xGreed_·
I almost fell into the AI trap... ChatGPT almost swallowed my brain too... If you rely too much on AI to do the hard work you aren't willing to do, you are basically screwed: - you lose your creativity - you give up on your expertise - you become less knowledgeable Our biggest asset as Security Researchers is our ability to understand a system. If we stop training it, it will atrophy. Stay sharp anon 🫡
Martin Marchev@MartinMarchev

x.com/i/article/2033…

English
4
3
23
2.5K