Gabriel Prostitis

20 posts

Gabriel Prostitis

Gabriel Prostitis

@___prosti

CTF player for @TheRomanXpl0it and @towerofhanoi student at @polimi

Italy Katılım Temmuz 2025
141 Takip Edilen296 Takipçiler
Gabriel Prostitis retweetledi
kqx
kqx@kqx_io·
Exploiting latest v8ctf instance with a 0day? ✅ Beating try-hards who stalk commits and exploit it as an N-day? ❌ In any case keep an eye out for the CVE release and stay tuned for a crazy post on kqx.io once the issue goes public
kqx tweet media
English
0
7
92
5.6K
Gabriel Prostitis retweetledi
kqx
kqx@kqx_io·
A little bonus while we're working on other cool stuff :)
kqx tweet media
English
5
4
106
4.1K
Gabriel Prostitis retweetledi
drivertom
drivertom@drivertomtt·
Hunting Linux kernel 0day with @FrankOverF1ow 5 days, from zero to stable privilege escalation. sha256: 2189d5b196f33d512d8d02c6f00d26f4c10bf79ba1f0ac389d6663e026aebbe8
English
7
25
187
15.1K
thethiny 🐰🍉
thethiny 🐰🍉@thethiny·
@___prosti @__invictus_ Is there a reliable way for a malicious actor to inject custom WASM into the exact memory address this & 1 is supposed to report? That's the only way I can think of this creating an RCE.
English
3
0
0
212
thethiny 🐰🍉
thethiny 🐰🍉@thethiny·
@__invictus_ This `& 1` checks if the bit is set. The comment on line 375 is confusing, are they checking if the bit is set or are they setting it? Cuz if they're supposed to set it should be `| 1`. In both cases this does not do any RCE.
English
2
0
4
3.4K
Gabriel Prostitis
Gabriel Prostitis@___prosti·
@__invictus_ Thanks for noticing and for the repost! I saw the other post of a "Firefox RCE" but it's total bs and absolutely not associated with what my teammate found.
English
0
0
1
1K
Gabriel Prostitis retweetledi
kqx
kqx@kqx_io·
How a single typo led to RCE in Firefox Can you spot the bug? Read now at: kqx.io/post/firefox0d…
kqx tweet media
English
6
93
637
147.2K
Gabriel Prostitis
Gabriel Prostitis@___prosti·
We decided to create a new account on X to consolidate all information in one place. Follow the account to be updated on the blog! @kqx_io
English
0
1
7
580
Gabriel Prostitis
Gabriel Prostitis@___prosti·
Let's begin the new year with some V8 exploitation! Learn how to turn a broken CanonicalEquality check into arbitrary Wasm type confusion in this ASIS CTF Finals writeup by @Erge! Read it here: kqx.io/writeups/singl…
Gabriel Prostitis tweet media
English
1
29
192
8.7K
Gabriel Prostitis retweetledi
leave
leave@_leave07·
had fun playing Backdoor CTF 2025, ended up fifth with TRX and first-blooded a kernel pwn challenge. Have a look at the writeup: kqx.io/writeups/vibe_…
leave tweet media
English
0
4
32
3K
Gabriel Prostitis retweetledi
leave
leave@_leave07·
had a lot of fun playing corctf this weekend. Ended up at 4th place with TRX and also managed to first-blood the uarch challenge authored by FizzBuzz101. You can find the writeup at kqx.io/writeups/zener…
Crusaders of Rust@cor_ctf

corCTF 2025 has ended! Congrats to the top 5: 1. @FlatNetworkOrg 2. @r3kapig @ProjectSEKAIctf 3. The Amazing Digital Orange 4. @TheRomanXpl0it 5. STM Thank you to all of our players and sponsors! @osec_io, Research Innovations, @ret2systems, @trailofbits, @vector35, @googlecloud

English
1
2
17
2K
Gabriel Prostitis retweetledi
leave
leave@_leave07·
Reviving CVE-2023-0597 with QEMU. Find out more at kqx.io/post/sp0/
English
0
2
3
715