Mohamed Sayed - مُحَمَّد 🇵🇸

1.4K posts

Mohamed Sayed - مُحَمَّد 🇵🇸 banner
Mohamed Sayed - مُحَمَّد 🇵🇸

Mohamed Sayed - مُحَمَّد 🇵🇸

@FlEx0Geek

check @FahemSec

Katılım Ocak 2016
252 Takip Edilen4.1K Takipçiler
Mohamed Sayed - مُحَمَّد 🇵🇸 retweetledi
د. إياد قنيبي
"ممنوع تدخل الجنة"! ردا على المشككين في إسلام #بتول_علوش والمهتدين عموماً. لاحظنا ان الكلمة الماضية "دعم وتأييد لبتول علوش" أثارت غير وقهر الشبيحة، فالحمد لله على ذلك. موتوا بغيظكم.
العربية
52
225
1.3K
32.7K
Mohamed Sayed - مُحَمَّد 🇵🇸 retweetledi
Thai S.D
Thai S.D@_sondt_·
😓 Pwn2Own 2026
CY
7
28
353
18.4K
Mohamed Sayed - مُحَمَّد 🇵🇸 retweetledi
the_storm
the_storm@the_st0rm·
@FlEx0Geek @Dinosn Great work! Sorry you couldn't make it. Looking forward to your next funding ;)
English
1
0
1
410
s1r1us (mohan)
s1r1us (mohan)@S1r1u5_·
can someone spinoff pwn2own for everyone who couldn’t register?
English
7
1
59
10.8K
Mohamed Sayed - مُحَمَّد 🇵🇸
International Cyber Digest@IntCyberDigest

‼️🚨 Pwn2Own Berlin 2026 just hit a wall. For the first time in 19-years, ZDI rejected dozens of working zero-day RCE submissions because organizers ran out of contest slots. Rejected hackers are now going public with PoC demos and direct vendor disclosures, breaking Pwn2Own's usual secrecy. ▪️ AI surfaces a massive wave of 0-day RCEs. ▪️ Submissions overwhelm ZDI past max capacity. ▪️ Slots run out. Researchers with working chains get rejected. ▪️ "Revenge disclosures" begin. ← we are here. Confirmed casualties so far: ▪️ @xchglabs : 86 vulnerabilities prepared (PyTorch, NVIDIA, Linux KVM, Oracle, Docker, Ollama, Chroma, LiteLLM, llama.cpp). All rejected. Now reporting directly to vendors with writeups dropping as patches land. ▪️ @ggwhyp : full-chain Firefox RCE on Windows. Rejected. Publicly demoed (HTML page → cmd.exe → calc.exe). Responsibly disclosed to Mozilla. ▪️ @yunsu_dev : working RCE chain, rejected. Submitting elsewhere. ▪️ @ryotkak : tried to register for 3+ weeks. ZDI confirmed "at maximum capacity, can't add extra contest days." Considered canceling flight and hotel. ▪️ @anzuukino2802 : Claude Code RCE PoC. Rejected. ▪️ @desckimh : 0-day RCEs in Ollama and LM Studio. Rejected. Reported impact: a community-estimated 150+ researchers tried to register. Accepted contestants are now being warned about collisions. Rejected vulnerabilities going to bug bounty programs may trigger pre-event patches that invalidate the work of those who got in. ZDI has not publicly addressed the capacity issue. The event still runs May 14-16 in Berlin.

English
0
5
37
3.2K
H4x0r.DZ 🇰🇵
H4x0r.DZ 🇰🇵@h4x0r_dz·
For the first time in history, Pwn2Own has reached full capacity. AI has changed the game forever
English
5
14
318
21K
Yuu
Yuu@anzuukino2802·
This was supposed to be my PoC for a Claude Code RCE aimed at Pwn2Own Berlin 2026, but ZDI never got back to me about my entry registration. It looks like I won't be able to register it at all...
English
15
32
321
27.2K
Mohamed Sayed - مُحَمَّد 🇵🇸 retweetledi
V4bel
V4bel@v4bel·
💥 Introducing "Dirty Frag" A universal Linux LPE chaining two vulns in xfrm-ESP and RxRPC. A successor class to Dirty Pipe & Copy Fail. No race, no panic on failure, fully deterministic. ~9 years latent. Ubuntu / RHEL / Fedora / openSUSE / CentOS / AlmaLinux, and more. Even if you've applied the "Copy Fail" mitigation, your Linux is still vulnerable to "Dirty Frag". Apply the Dirty Frag mitigation. Details: dirtyfrag.io
GIF
English
41
704
2.1K
517.4K
Mohamed Sayed - مُحَمَّد 🇵🇸 retweetledi
Xint
Xint@xint_official·
Patch your Linux boxes! Copy.Fail is a trivially exploitable logic bug in Linux, reachable on all major distros released in the last 9 years. A small, portable python script gets root on all platforms. Found by the teams at @theori_io and @xint_official More details below xint.io/blog/copy-fail…
English
24
365
991
246.6K