Paolo Stagno (VoidSec)

1.7K posts

Paolo Stagno (VoidSec) banner
Paolo Stagno (VoidSec)

Paolo Stagno (VoidSec)

@Void_Sec

Director of Research @Crowdfense. Windows Vulnerability Researcher and Exploit Developer, ex-@XI_Research

ntoskrnl.exe Katılım Kasım 2013
1.9K Takip Edilen5K Takipçiler
Paolo Stagno (VoidSec) retweetledi
offensivecon
offensivecon@offensive_con·
We appreciate @crowdfense's continued support to Offensivecon as a Silver Sponsor!
offensivecon tweet media
English
0
3
14
1.5K
Daniel Sempere Pico
Daniel Sempere Pico@dansemperepico·
Looks like the UAE government press conference is going to be in Arabic only. I'm seeing if, in the next few minutes, Claude Code can code me something that will do live streaming text translation. Working against the clock.
Daniel Sempere Pico tweet media
English
18
3
40
20.6K
Paolo Stagno (VoidSec)
Paolo Stagno (VoidSec)@Void_Sec·
@oechsleoi @rueseraa They are based on proximity, so you only receive them if you're in a possible "affected" area. On android you can check your setting under "wireless emergency alerts"
English
0
0
1
137
Paolo Stagno (VoidSec) retweetledi
clearbluejar
clearbluejar@clearbluejar·
Patch diffing + RCA for clfs.sys can awhile. I gave the diff + binary to a local LLM. It mapped the UAF path, race condition, all IOCTLs in <20 min LLMs don't replace the work, they are momentum. New blog post following the UAF trail of CVE-2025-29824: clearbluejar.github.io/posts/how-llms…
English
3
34
113
8.3K
Paolo Stagno (VoidSec)
Paolo Stagno (VoidSec)@Void_Sec·
@Bad_Jubies Actually I'm building MCP to expose already built exploit to AI. To find and exploit bugs I still rely on good old reverse engineering :)
English
0
0
1
47
Bad_Jubies
Bad_Jubies@Bad_Jubies·
@Void_Sec Anything you can share publicly? I’ve had mixed results. I’ve been exporting bindiff results, feeding it to Claude and give it a binary ninja MCP with pre and post patch binaries loaded. It’s good at identifying/tracing the patch, but I usually have to help dev the trigger
English
1
0
0
50
Paolo Stagno (VoidSec)
Paolo Stagno (VoidSec)@Void_Sec·
Building MCPs to leverage our n-day feed, interesting experience and some very promising results so far
English
1
0
12
922
Paolo Stagno (VoidSec) retweetledi
Sean Heelan
Sean Heelan@seanhn·
Blog post: On the Coming Industrialisation of Exploit Generation with LLMs sean.heelan.io/2026/01/18/on-… TL;DR: I ran an experiment with GPT-5.2 and Opus 4.5 based agents to generate exploits for a zeroday QuickJS bug. They're pretty good at it. Code: github.com/SeanHeelan/ana…
English
29
236
1.1K
226.3K
Paolo Stagno (VoidSec) retweetledi
lander
lander@landaire·
I wrote about a file format for Unreal Engine 2 games which for the last 20 years has inadvertently hidden game assets from data miners... until now :) landaire.net/a-file-format-…
English
6
26
82
10.7K
Paolo Stagno (VoidSec)
Paolo Stagno (VoidSec)@Void_Sec·
What is old is new again! Regarding PPL and in general Protected Processes on Windows, may I suggest a talk that I gave on this topic over 2 years ago? youtu.be/-KWZqoJkg-I
YouTube video
YouTube
English
0
2
7
1.2K
Robin
Robin@D4mianWayne·
@Void_Sec @gh0stbyt3 @HexRaysSA Thanks for asking! So, BinDiff works on disassembly and Diaphora integrates with IDA plugin. DiffRays instead uses pseudocode via headless IDA, with CLI+web for portable/collab use and gives clear visualization of the metrics and simplified navigation.
English
2
0
2
350
Aliz (they/them pls)
Aliz (they/them pls)@AlizTheHax0r·
It’s pretty awesome tbh. Plus, STAB is a very “Aliz” project. Like, we’ve all got our strengths but this project suits mine down to the ground. I feel that “other people couldn’t have pulled this off” feeling. My colleagues are leet but this project is matched to my skills.
English
2
0
4
206
Aliz (they/them pls)
Aliz (they/them pls)@AlizTheHax0r·
So watchTowr - my employer - sponsored the back page of phrack! I’m so excited about this, maybe more than I should be. Like, I’m not able to contribute an article but I am still (albeit small) helping hacker culture. It’s also validation that we (wt) are doing things right. Also
English
1
0
16
665
Marcin Noga
Marcin Noga@_Icewall·
@Void_Sec I guess so, that's why I mentioned the timeline in the blog post . On pasted screenshots I only mention about mem leak primitive, but in general I wanted to signal that after 24H2 the exploit won't work.
Marcin Noga tweet mediaMarcin Noga tweet media
English
1
0
0
250