0x4d5a

83 posts

0x4d5a banner
0x4d5a

0x4d5a

@0x4d5aC

CTF Player at @ALLESctf and @Sauercl0ud! Security Researcher @Neodyme. Mostly RE, pwn and Windows internals

Katılım Ağustos 2019
293 Takip Edilen630 Takipçiler
0x4d5a
0x4d5a@0x4d5aC·
@mr_phrazer Nice, I'm testing it out right now. Do you plan to add remote support for Ghidra servers? From my experience its quite a hassle to export the ghidra project after each run and pull it from the restricted environment
English
1
0
0
90
0x4d5a retweetledi
CSCG
CSCG@C_S_C_G·
CSCG 2026 is live (until 01.05.)! 🥳 Jump in, solve challenges, learn something new, and climb the scoreboard. This year CSCG also serves as the OpenECSC for ECSC 2026 Germany. @ECSC_openECSC play.cscg.live
English
1
10
18
11.8K
0x4d5a retweetledi
Neodyme
Neodyme@Neodyme·
Drones are hot - their security is not. Here is how removed the NAND, dumped firmware, and reverse-engineered ECC on a consumer drone. Stay tuned for part 2! neodyme.io/de/blog/drone_…
English
2
14
20
1.1K
0x4d5a
0x4d5a@0x4d5aC·
@f00fc7c800 DM'ed. Didn't look into my DMs for a while, sorry
English
0
0
1
20
f00fc7c800
f00fc7c800@f00fc7c800·
@0x4d5aC any chance you could check your dm anyways i would like to talk about a partnership opportunity for a cyber CTF competition i organise . thank you :)
English
1
0
0
29
0x4d5a
0x4d5a@0x4d5aC·
@clearbluejar That looks pretty nice! Any ETA on the release for us to play around with this?
English
1
0
0
132
clearbluejar
clearbluejar@clearbluejar·
📢 Incoming release: pyghidra‑mcp 🛠️ Meet your new RE best friend. Harness frontier models or a local gpt-oss-20b llm brain to power Ghidra multi‑binary, project‑wide analysis. You’ll be slicing through code like butter 🧈😆 ETA: imminent. Keep your shells warm 🔥🐙⚡🐉
English
1
9
39
3.5K
0x4d5a retweetledi
Neodyme
Neodyme@Neodyme·
@GMX_IO V1 has been hacked. Here is how:
Neodyme tweet media
English
2
6
18
4K
0x4d5a retweetledi
Neodyme
Neodyme@Neodyme·
Day 2 at @offensive_con has just started and our colleagues Kolja Grassmann and Alain Rödel are right in the middle of it! 🔥 Can't wait to hear the insights they bring back from some of the sharpest minds in offensive security. If you're there too, make sure to say hi!
Neodyme tweet media
English
0
4
22
2.9K
0x4d5a retweetledi
CSCG
CSCG@C_S_C_G·
The Cyber Security Challenge Germany 2025 has started! 🎉 The competition runs from March 1 - 18:00 CET to May 1 - 18:00 CEST. We're excited to announce that we are inviting the top 6 DACH players in the EARTH category to the @DHM_ctf! Participate now at: play.cscg.live
GIF
English
0
5
13
5K
0x4d5a retweetledi
Neodyme
Neodyme@Neodyme·
Wrapping up our COM hijacking series! 🎉 In the final part, we discuss a custom IPC protocol, use a registry write to gain SYSTEM privileges, and explore Denial of Service attacks on security products. 💥💻 Don't miss it! neodyme.io/en/blog/com_hi…
English
0
16
50
2.4K
0x4d5a retweetledi
Neodyme
Neodyme@Neodyme·
🔎Digging deeper into COM hijacking! In Part 3, we explore two new vulnerabilities: 🗑️ Webroot Endpoint Protect (CVE-2023-7241) – SYSTEM via arbitrary file deletion 📥 Checkpoint Harmony (CVE-2024-24912) – SYSTEM via a file download primitive Read more: neodyme.io/en/blog/com_hi…
English
0
18
60
3.8K
0x4d5a retweetledi
Neodyme
Neodyme@Neodyme·
🪝Introducing HyperHook! 🪝 A harnessing framework for snapshot-based #fuzzing using Nyx. ⚒️ HyperHook simplifies guest-to-host communication & automates repetitive tasks, making snapshot-fuzzing easier & more efficient! 🔗 Read more: neodyme.io/en/blog/hyperh…
English
1
7
12
913
0x4d5a retweetledi
Neodyme
Neodyme@Neodyme·
🔎Part 2 of our COM hijacking series is live! This time, we discuss a vulnerability in AVG Internet Security, where we bypass an allow-list, disable self-protection, and exploit an update mechanism to escalate privileges to SYSTEM 🚀💻 neodyme.io/en/blog/com_hi…
English
1
15
47
2.3K
0x4d5a retweetledi
Neodyme
Neodyme@Neodyme·
Your laptop was stolen. It’s running Windows 11, fully up-to-date, device encryption (BitLocker) and Secure Boot enabled. Your data is safe, right? Think again! This software-only attack grabs your encryption key. Following up on our #38C3 talk: neodyme.io/blog/bitlocker…
English
2
29
85
5.9K
0x4d5a
0x4d5a@0x4d5aC·
Intro blogpost with details of the TrendMicro LPE vulnerability (Named Pipe Replay) just went live!
Neodyme@Neodyme

Following our #38c3 talk about exploiting security software for privilege escalation, we're excited to kick off a new blog series! 🎊 Check out our first blog post on our journey to 💥 exploit five reputable security products to gain privileges via COM hijacking: neodyme.io/blog/com_hijac…

English
1
16
48
9.8K
0x4d5a
0x4d5a@0x4d5aC·
Slides for our talk "The Key to COMpromise" (AV/EDR privilege escalation) are on GitHub. If you want to discuss this stuff, you can find @__k0lja or me at the CTF area of 38C3 github.com/0x4d5a-ctf/38c…
English
2
80
238
15.9K
0x4d5a retweetledi
Neodyme
Neodyme@Neodyme·
Ever feel like Solana’s consensus isn’t clearly explained? We did too — so we dove deep and broke it all down for you. With code-references for the glass-eaters!
Neodyme tweet media
English
6
36
154
22.1K
0x4d5a retweetledi
Neodyme
Neodyme@Neodyme·
💥When security software itself becomes a target! 💥 Learn how we've uncovered critical vulnerabilities in Wazuh, turning a powerful security tool into an unexpected attack vector. 👉 Read more about the findings: neodyme.io/en/blog/wazuh_…
English
0
7
13
1.4K