Natnael Samson

80 posts

Natnael Samson banner
Natnael Samson

Natnael Samson

@NattiSamson

Security Researcher

Katılım Eylül 2018
300 Takip Edilen146 Takipçiler
dawgyg - WoH
dawgyg - WoH@thedawgyg·
its 0 click, exploited just from opening a webpage. but its not a sandbox escaped RCE, its a renderer RCE. I was hoping for 50-60k from VRP for it, so was disappointed with the 11k. i think i know what happened here and requested they re-eval it, because most of the evidence about the exploit + bisect + patch were in restricted comments that i dont think they saw (they even said this right before the bounty "In the future, please do not restrict bug comments. It potentially impacts the VRP process.")
English
2
0
2
189
dawgyg - WoH
dawgyg - WoH@thedawgyg·
Maybe should sell to the brokers next time lol
dawgyg - WoH tweet mediadawgyg - WoH tweet media
English
35
5
324
18.9K
dawgyg - WoH
dawgyg - WoH@thedawgyg·
mm seems my machine is thinking to hard... 14:13:32 up 6 days, 12:17, 6 users, load average: 144.27, 137.84, 133.86
English
3
0
9
1.7K
Natnael Samson retweetledi
Virus Bulletin
Virus Bulletin@virusbtn·
Check Point Research demonstrates how generative AI can speed up reverse engineering from days to hours by exporting IDA data to ChatGPT for deep static analysis. research.checkpoint.com/2025/generativ…
Virus Bulletin tweet media
English
1
96
387
20.8K
Natnael Samson retweetledi
Synacktiv
Synacktiv@Synacktiv·
Following their presentation at @hexacon_fr, Mehdi & Etienne detail how they exploited CVE-2023-40129, a critical vulnerability affecting the Bluetooth stack in Android ⬇️ synacktiv.com/en/publication…
English
0
51
142
13K
Natnael Samson retweetledi
Boris Larin
Boris Larin@oct0xor·
TrueType is the gift that keeps on giving (do you remember Triangulation?) and Peter @bl4sty keeps on winning pwn2own thanks to it #TheSAS2025
Boris Larin tweet mediaBoris Larin tweet mediaBoris Larin tweet media
English
0
3
38
5.5K
Natnael Samson retweetledi
Dohyun Lee
Dohyun Lee@l33d0hyun·
OMG.. whatsapp 0c in pwn2own
Dohyun Lee tweet media
English
17
105
724
350.2K
Natnael Samson retweetledi
CyberRobo
CyberRobo@CyberRobooo·
Sharp Robotics of Singapore has officially unveiled SharpaWave, an impressively dexterous hand. The 1:1 life-size model boasts 22 degrees of freedom, with over 1,000 tactile sensors per fingertip. It can crack eggs, play the piano, or use scissors, combining strength, speed, and dexterity once thought impossible.
CyberRobo@CyberRobooo

Impressive dexterity. SharpaWave is a 1:1 scale, 22-degree-of-freedom dexterous hand with a sense of touch, similar to a human hand, capable of performing tasks with precision, such as peeling an egg, playing the piano, or using scissors.

English
268
902
6.1K
892.9K
Microsoft Security Response Center
Microsoft Security Response Center@msftsecresponse·
Congratulations to all the researchers recognized in this quarter’s MSRC 2025 Q3 Security Researcher Leaderboard! Thanks to all the researchers who partnered with us for your hard work and continued dedication to securing our customers. Learn more in our blog post: msft.it/6016sfncp We also want to recognize the top 10 researchers in the leaderboard: 🥇Brad Schlintz (@nmdhkr) 🥈 Yuval Avrahami 🥉 b2ahex 4. Jianyang song 5. Felix B. 6. Haifei Li @HaifeiLi 6. tuandv of Viettel Cyber Security 8. P1hcn 9. 0x140ce @0x140ce 10. Matthew Jensen
Microsoft Security Response Center tweet media
English
2
7
33
13.9K
Natnael Samson retweetledi
Mussy
Mussy@Mu55sy·
We opened the iOS sandbox like a museum vault—carefully, layer by layer—and found the rulebook written in runes. So @yarden_ha revived an old decompiler (dev CPR 🫀🛠️), added modern iOS support, and turned noise into readable signals. Now the policies aren’t “mystery beach sand,” they’re a map you can navigate: what’s allowed, what’s fenced, why that API says “no.” Research → faster. Insights → deeper. Clarity → finally. Only at #OBTS 🍏 do tools get resurrected and upgraded in one talk.
Mussy tweet mediaMussy tweet media
English
0
18
140
9.1K
Natnael Samson retweetledi
h0mbre
h0mbre@h0mbre_·
Wrote a blogpost today on how to write a harness for Lucid. This is the harness I'll be using to fuzz `nftables`. Some overlap with last blogpost, but everything is explained step-by-step. First blog entry into my earnest attempt to find bugs with Lucid for the 1st time: 👇
English
2
8
68
4.8K
Natnael Samson retweetledi
Zero Day Engineering
Zero Day Engineering@zerodayalpha·
🐞Bug Spotlight: CVE-2025-10200 – Use-after-Free in Chrome Service Worker [bounty $43000] One-shot renderer RCE to sandbox escape with a deep iterator invalidation Issue: 🔒440454442 (currently private) Reported by Looben Yang Reverse engineering & PoC exploit by @alisaesage
Zero Day Engineering tweet mediaZero Day Engineering tweet mediaZero Day Engineering tweet mediaZero Day Engineering tweet media
English
4
45
365
50.3K
Natnael Samson retweetledi
Alex Plaskett
Alex Plaskett@alexjplaskett·
A great write-up of a VMware Workstation guest-to-host escape (CVE-2023-20870/CVE-2023-34044 and CVE-2023- 20869) exploit by Alex Zaviyalov has just been published!
Alex Plaskett tweet mediaAlex Plaskett tweet mediaAlex Plaskett tweet mediaAlex Plaskett tweet media
English
4
102
466
32.2K