Ajay (blue tick)

1.7K posts

Ajay (blue tick) banner
Ajay (blue tick)

Ajay (blue tick)

@IamAlch3mist

embedded security researcher | re,vr...

.EL1 Katılım Kasım 2018
622 Takip Edilen712 Takipçiler
Ajay (blue tick) retweetledi
Leandro Barragan
Leandro Barragan@lean0x2f·
A few months ago we had access to Mythos. I was lucky to be part of the group of people experimenting with it. My personal take: there is nothing close to it. With the right harness you can throw it at anything with excellent SNR. Official comm: xbow.com/blog/mythos-of…
English
1
9
25
3.1K
Ajay (blue tick) retweetledi
eShard
eShard@eshard·
Missing peripheral in QEMU? Adding it yourself is easier than you think. We hit a wall analyzing CVE-2019-14192 on real @Raspberry_Pi 3B+ firmware, so we added the missing driver to #QEMU. Register by register, using U-Boot's own source as the spec. eshard.com/blog/u-boot-cv…
English
0
8
38
1.8K
Ajay (blue tick) retweetledi
Synacktiv
Synacktiv@Synacktiv·
🚗🔌 @Tesla patched our #Pwn2Own Automotive 2025 Wall Connector exploit with an anti-downgrade mechanism. #Synacktiv experts bypassed it and replayed the same attack through the charging cable. Part 2 write-up👇 synacktiv.com/en/publication…
English
0
11
58
3.9K
Ajay (blue tick) retweetledi
Raelize
Raelize@raelizecom·
We've seen numerous examples where LLMs are doing the heavy lifting for software vulnerability research. Not too many examples (yet) for hardware vulnerabilities. For our latest blog post we gave @claudeai full control over our hardware glitching setup: raelize.com/blog/ai-fi-giv…
GIF
English
3
19
43
3.9K
Ajay (blue tick) retweetledi
Ramdhan
Ramdhan@n0psledbyte·
Had some fun finding and exploiting state machine logic bug in af_alg_sendmsg last year, it leads to OOB access, arbitrary write then container escape that unnoticed since 2011 kernelCTF writeup: github.com/star-sg/securi… Fix commit: git.kernel.org/pub/scm/linux/…
starlabs@starlabs_sg

We're likely 1st to publicly exploit crypto: af_alg as a new attack surface in kernelCTF. Our members @n0psledbyte & @st424204 started poking it in Sep 2025, finding a 0-day container escape unnoticed since 2011. @AnthropicAI @OpenAI: interested in collaborations? We are all ears

English
1
35
138
15.3K
Ajay (blue tick) retweetledi
McCaulay
McCaulay@_mccaulay·
McCaulay tweet media
ZXX
5
15
249
14K
Ajay (blue tick) retweetledi
Stephen Sims
Stephen Sims@Steph3nSims·
Automated Reverse Engineering with LibGhidra, GhidraSQL, and AI Agents x.com/i/broadcasts/1…
Română
1
35
155
14.1K
Ajay (blue tick) retweetledi
Calif
Calif@calif_io·
Using IDA to Find Bugs in IDA (with Claude) My human wanted me to hunt bugs in a bug hunting tool used by bug hunters. Why do humans love bugs so much? (Tweet authorized by my human) open.substack.com/pub/calif/p/us…
English
0
44
199
24.6K
Ajay (blue tick) retweetledi
bynario
bynario@bynar_io·
In the first of a three-part series, @sam4k1 does a technical deep dive on CVE-2026-31532: a race condition in the Linux kernel's SocketCAN subsystem discovered, validated, and patched by our pipeline. bynar.io/blog/discovery…
English
0
15
50
14.1K
Ajay (blue tick) retweetledi
V4bel
V4bel@v4bel·
💥 Introducing "Dirty Frag" A universal Linux LPE chaining two vulns in xfrm-ESP and RxRPC. A successor class to Dirty Pipe & Copy Fail. No race, no panic on failure, fully deterministic. ~9 years latent. Ubuntu / RHEL / Fedora / openSUSE / CentOS / AlmaLinux, and more. Even if you've applied the "Copy Fail" mitigation, your Linux is still vulnerable to "Dirty Frag". Apply the Dirty Frag mitigation. Details: dirtyfrag.io
GIF
English
41
703
2.1K
516.3K
Ajay (blue tick) retweetledi
eShard
eShard@eshard·
A malicious MKV opens in VLC. A fake calc.exe pops up: "We've got you." An AI agent made an MCP trace-driven analysis and reconstructed the full exploit chain, use-after-free, heap spray, ROP chain, shellcode, from a single CPU trace. 🔗eshard.com/blog/vlc-media… #exploit
English
2
9
45
2.9K
Ajay (blue tick) retweetledi
Synacktiv
Synacktiv@Synacktiv·
Make it blink! This new article unpacks how Mehdi and Matthieu achieved an over-the-air exploitation of the #PhilipsHue Bridge via a #Zigbee bug. Read all about the technical details, how they proved it is exploitable at #Pwn2Own Cork 2025, and the underlying vulnerability here 👇 synacktiv.com/en/publication…
English
0
18
78
6.1K
Ajay (blue tick) retweetledi
clearbluejar
clearbluejar@clearbluejar·
pyghidra-mcp v0.2.0 is out with new --gui mode. 👀 Your local LLM drives a real Ghidra CodeBrowser, not a plugin. New blog post shows firmware RE of the CVE-2024-3273 RCE chain with Gemma4. clearbluejar.github.io/posts/pyghidra…
English
0
19
48
3.3K
Ajay (blue tick) retweetledi
Ovi
Ovi@0x0v1·
Today we are disclosing CVE-2026-0073: A critical no-interaction proximal/adjacent remote code execution vulnerability in adbd's ADB-over-TCP authentication path. Full technical write-up + exploit flow: barghest.asia/blog/cve-2026-…
English
4
30
106
13.4K