cbayet

406 posts

cbayet banner
cbayet

cbayet

@OnlyTheDuck

Security expert and CTO @Reverse_Tactics

Katılım Nisan 2017
395 Takip Edilen1.7K Takipçiler
cbayet
cbayet@OnlyTheDuck·
Awesome bp on a Workstation escape using a bug I also found in 2024, and never managed to exploit... Found the ESXi vuln I used at the same #Pwn2Own while looking for interesting objects to overwrite with the LFH OOB 😅 Those guys found the bug and exploited it in a few days !
Synacktiv@Synacktiv

At #Pwn2Own Berlin 2025, a full exploit chain against VMware Workstation was demonstrated via a heap overflow in the PVSCSI controller. Despite Windows 11 LFH mitigations, advanced heap shaping and side-channel techniques enabled a reliable exploit. 🔍 Full technical write-up 👇 synacktiv.com/en/publication…

English
2
0
11
1.7K
cbayet retweetledi
REcon
REcon@reconmtl·
🚨 REcon 2026 is LIVE! 🚀 Call for papers and registration are now open! Join the world's top reverse engineers & exploit devs in Montreal: 🛠 Trainings: June 15-18 (19 hands-on classes – AI agents, kernel exploits, Rust/Go reversing, fault injection & more!) 📅 Conference: June 19-21 Tickets & early bird now open → recon.cx Shoutout to the legends teaching: @SinSinology @KyleMartin @MalachiJonesPhD @andreyknvl @mr_phrazer @yarden_shafir @DrCh40s @pulsoid + more elite instructors! See website for all trainers and session info. Limited spots – see you in MTL! #REcon2026 #ReverseEngineering
English
0
49
142
18.7K
emma
emma@carrot_c4k3·
FOR IMMEDIATE RELEASE: exploits.forsale's statement on the arrest of Peter Williams
emma tweet media
English
8
30
213
30.5K
SinSinology
SinSinology@SinSinology·
First and foremost, Thank you God for all of this. Second, our eternal respect to the amazing teams @thezdi and @TrendMicro for making this competition possible! Third, thank you to the film crew (blackrabbitint) working with zdi to make all of those great videos of us! Finally, we have prepared a message from all of us @SummoningTeam (@_mccaulay, @Yogehi, @Ch0pin, @hyprdude, and myself).
TrendAI Zero Day Initiative@thezdi

$1,024,750 - 73 unique bugs - a week of amazing research on display. #Pwn2Own Ireland had it all. Success. Failure. Intrigue. You name it. Congratulations to the Master of Pwn winners @SummoningTeam! Their outstanding work earned them $187,500 and 22 point. See you in Tokyo for Pwn2Own Automotive.

English
27
17
291
32.1K
cbayet
cbayet@OnlyTheDuck·
@theflow0 Impressive exploit and the blog post is so easy to read ! Amazing work 👌
English
0
0
2
434
cbayet
cbayet@OnlyTheDuck·
Love the top-bottom approach of this blogpost ! A great way to explain internals in my opinion, and the kind of reference you look when you're trying to exploit a heap bug. Also glad to see that our paper (with @paulfariello) of 2020 is still relevant !
ö@r0keb

Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, internal structures, and how Segment Heap, LFH, and VS work. r0keb.github.io/posts/Windows-…

English
0
2
16
2.9K
cbayet
cbayet@OnlyTheDuck·
@roddux Haha forever basically meant as long as I can remember 😅 but yeah there is some commits at least 17 years old there 😉
English
0
0
1
142
cbayet retweetledi
TyphoonCon🌪️
TyphoonCon🌪️@typhooncon·
🌪️ Back from lunch just in time to escape VirtualBox and unchaining objects in the Windows Kernel with Corentin Bayet
TyphoonCon🌪️ tweet media
English
0
6
12
3.2K
cbayet retweetledi
REverse_Tactics
REverse_Tactics@Reverse_Tactics·
It's time for @offensive_con and #Pwn2Own ! Come meet us there and and attend our sessions: 📅 Fri, May 16 @ 18:45 — Our talk “Journey to Freedom” about escaping VirtualBox during Pwn2Own 2024 📅 Sat, May 17 @ 14:00 — Watch our live VMware ESXi escape attempt ar #Pwn2Own
English
0
2
9
2.2K