k0shl

612 posts

k0shl banner
k0shl

k0shl

@KeyZ3r0

BOOMBAP!

China Katılım Aralık 2016
208 Takip Edilen6.8K Takipçiler
k0shl
k0shl@KeyZ3r0·
Today is my last day at Cyber Kunlun. I’ve gained many valuable experiences and unforgettable memories with this amazing team. Thanks all my awesome teammates! Becoming an independent security researcher will be a new challenge for me in 2026. Keep on keeping on!
English
3
2
103
7.5K
k0shl
k0shl@KeyZ3r0·
And then, the vulnerability requires no specific user group or configuration — any normal user in a default environment can trigger it. Finally, it is an out-of-bounds read that leaks about 64 pages from the .data section, not the heap memory. It's simple and easy to exploit.🤣
English
1
2
23
2.8K
k0shl
k0shl@KeyZ3r0·
This month MSRC fixed my Windows Defender info leak vulnerability CVE-2025-62468, but all acknowledgments are incorrect. First, I provided a working exploit, so it’s not “exploitable unlikely.”😅msrc.microsoft.com/update-guide/v…
k0shl tweet media
English
4
16
176
16.2K
k0shl
k0shl@KeyZ3r0·
I found a stack overflow bug in a win component that, unlike a typical stack overflow, reliably writes into the PAGE_GUARD region before the start of stack. Root cause is new to me, I’ve never seen this kind of crash before. It’s an interesting case, and I might share more soon😌
English
3
3
65
6.5K
swing
swing@bestswngs·
@KeyZ3r0 哥 博客很久没更新了 我来催更了
中文
1
0
1
614
chiefpie
chiefpie@cplearns2h4ck·
Some of my bugs are patched in this month's patch tuesday, including the ones I used for Pwn2Own Berlin 2025. CVE-2025-50167 Race UAF in Hyper-V
chiefpie tweet media
English
9
37
382
24K
k0shl retweetledi
Samuel Groß
Samuel Groß@5aelo·
We released our Fuzzilli-based V8 Sandbox fuzzer: github.com/googleprojectz… It explores the heap to find interesting objects and corrupts them in a deterministic way using V8's memory corruption API. Happy fuzzing!
English
2
74
294
24.1K
k0shl retweetledi
Black Hat
Black Hat@BlackHatEvents·
During #BHUSA Briefing "Diving into Windows HTTP: Unveiling Hidden Preauth Vulnerabilities in Windows HTTP Services," we will discuss the different architectures of Windows HTTP services and share multiple previously undisclosed vulnerability cases and attacks. We will also summarize these new vulnerability patterns and provide a comprehensive interpretation of the security threats within the realm of Windows HTTP services. Register now >> bit.ly/3GvK9rr
Black Hat tweet media
English
0
1
14
5.2K
Team Vitality CS
Team Vitality CS@TeamVitalityCS·
The next team of the year, bookmark this tweet
Team Vitality CS tweet media
English
40
218
5.4K
607.6K
k0shl retweetledi
Black Hat
Black Hat@BlackHatEvents·
In #BHUSA Briefings "Diving into Windows HTTP: Unveiling Hidden Preauth Vulnerabilities in Windows HTTP Services" where the speakers will discuss the different architectures of Windows HTTP services and share multiple previously undisclosed vulnerability cases and attacks. They will also summarize these new vulnerability patterns and provide a comprehensive interpretation of the security threats within the realm of Windows HTTP services. Learn more here >> bit.ly/3EWB3mI
Black Hat tweet media
English
0
3
9
5.5K
k0shl
k0shl@KeyZ3r0·
Excited to announce our talk has been accepted by @BlackHatEvents #BHUSA!🥳🥳🥳 In my part of presentation, I’ll cover logic-based pre-auth remote vulnerabilities uncovered via novel abuse of Windows native HTTP API. Can't wait to see y'all in Las Vegas! #diving-into-windows-http-unveiling-hidden-preauth-vulnerabilities-in-windows-http-services-44873" target="_blank" rel="nofollow noopener">blackhat.com/us-25/briefing…
k0shl tweet media
English
10
18
150
19.8K
k0shl retweetledi
deepsec.cc
deepsec.cc@deepsec_cc·
[Official Announcement]: deepsec.cc 2025 IS COMING!!! This is a community-driven, non-profit information security closed-door symposium, where technology speaks loudest. 🌐 deepsec.cc 📅 June 16, 2025 📍 Shanghai, China 📧 x@deepsec.cc
deepsec.cc tweet media
English
0
11
35
18.3K
raven
raven@raid_akame·
@KeyZ3r0 大佬给新人留点机会😂
中文
1
0
0
72
k0shl retweetledi
VictorV
VictorV@vv474172261·
I'm unable to join the conference Insomni’hack 2025, so I write a part of content into a blog, hope you enjoy my blog. v-v.space/2025/02/18/Azu…
English
7
36
126
18.8K