Ivan

98 posts

Ivan banner
Ivan

Ivan

@Ivanklydz

Security researcher with deep focus on vulnerability detection.

Katılım Nisan 2025
56 Takip Edilen245 Takipçiler
Session
Session@session_app·
Without additional funding, Session's doors will close next month. Please read this appeal from Session co-founder Chris McCabe. getsession.org/donation
English
108
193
526
42.3K
Ivan
Ivan@Ivanklydz·
@solostalking Seems like an Android spyware development portrayed as research
English
0
0
0
47
Raaz
Raaz@solostalking·
What the heck these guys are testing at 8[.156.82.11:3000
English
4
3
34
6.6K
Ivan
Ivan@Ivanklydz·
Just because a company claims it's software is privacy based, doesn't mean it is.
English
0
0
3
73
Ivan
Ivan@Ivanklydz·
@fl33tingly @DoingFedTime the bug is in toxcore itself, if you are not using the tor implementation then it doesn't matter. Even the maintainer itself acknowledges this is a weakspot: // TODO(irungentoo): remove this and find a better source of nodes to use for paths.
English
1
0
4
361
Rize
Rize@fl33tingly·
@Ivanklydz @DoingFedTime Believe it when I see a write up. You mention no client by name when there is hundreds, mention onion when a user could be using Socks5, user could be using ToXiC instead of QTox, I suspect your bugs are in QTox. I will wait for the write up and perhaps I am wrong.
English
1
0
3
400
Ivan
Ivan@Ivanklydz·
Hello, TOX protocol lovers and the most wanted ransomware operators using TOX for comms! With only your public Tox ID, I can see who you’re talking to, reveal your real IP behind proxies, and even track your activities. #Onion_Path_Poisoning research coming soon! @DoingFedTime
English
2
1
19
3.5K
Ivan
Ivan@Ivanklydz·
I found a new crazy exploit for stb library It's made of 3 critical vulnerabilities, and after I chained them together I ended up with a 0click RCE for those who don't know about STB libary it powers basically the entire indie game dev world, engines, apps and a ton of tools.
English
0
0
0
211
Ivan
Ivan@Ivanklydz·
I had to delete the article and POC about this exploit after a notification from MSRC to keep the details of this case confidential during the investigation, once It's patched I will publish the draft again #windows
English
0
0
1
172
Ivan
Ivan@Ivanklydz·
@ishowcybersec It is actually available, just a different name
English
0
0
0
18
iShowCybersecurity
iShowCybersecurity@ishowcybersec·
Active Directory is not available on Linux
iShowCybersecurity tweet media
English
7
5
30
2K
Ivan
Ivan@Ivanklydz·
@Hermes_tooll all proxies do that though, that's not a real vulnerability.
English
0
0
1
154
Hermes Tool
Hermes Tool@Hermes_tooll·
Telegram 1-click vulnerability verified to reveal your real IP address, even if you use a proxy. Affects both Android and iOS Telegram clients.
English
14
89
666
56.5K
Ivan
Ivan@Ivanklydz·
The entire update download URL, including the P4 access token, is served over plain HTTP Nice work @Microsoft
Ivan tweet media
English
0
0
0
164
Financial Dystopia
Financial Dystopia@financedystop·
Telling ChatGPT to recite all 8.2 billion names of everyone on Earth
English
1.1K
262
5.1K
1.1M
Ivan
Ivan@Ivanklydz·
@WindowsLatest YES YES YES, MORE WINDOWS EXPLOITS LET'S GOOO
English
0
0
0
123
Windows Latest
Windows Latest@WindowsLatest·
Ladies and gentlemen, the upcoming Calendar Agenda view in Windows 11 Notification Center is a... WebView2 component! 🎉 WebView2 is a Microsoft component that embeds web content (HTML, CSS, and JavaScript) into Windows apps. When Windows 11 shipped in 2021, it dropped support for many Windows 10 features as part of modernization efforts, including Outlook Calendar Agenda view in the Notifications Center. Now, it's coming back, but it's going to be a WebView2.
Windows Latest tweet media
English
231
158
2.5K
976.1K
NetworkChuck
NetworkChuck@NetworkChuck·
Try to pass this👇
NetworkChuck tweet media
English
28
13
237
38.7K