jle-k

14 posts

jle-k banner
jle-k

jle-k

@_jle_k

globally-ranked Microsoft OneDrive hater

Katılım Ocak 2020
120 Takip Edilen153 Takipçiler
jle-k retweetledi
Alex Plaskett
Alex Plaskett@alexjplaskett·
An analysis of CVE-2026-21236 - A heap based buffer overflow in the Microsoft Windows Kernel afd.sys - was just published by @ASN_Sinanju_06S a recent secondment with my team EDG! Nice work for her first triage of a kernel memory corruption bug! nccgroup.com/research/vulne…
English
3
63
229
16.1K
jle-k retweetledi
Pavel Yosifovich
Pavel Yosifovich@zodiacon·
I’ll be running a live session: “Live Windows Research Using WinDbg.” We’ll explore how to investigate Windows internals in real time using WinDbg, inspecting kernel structures, processes, and system behavior live. If you're into Windows internals, debugging, or security research, this session is for you. Details: trainsec.net/library/window… #windbg #windowsinternals #cybersecurity
English
1
30
218
12.9K
jle-k retweetledi
chiefpie
chiefpie@cplearns2h4ck·
Windows kernel 0day hunting with AI agents👻 2026 style
chiefpie tweet media
English
14
41
362
26.3K
jle-k retweetledi
Logan Graham
Logan Graham@logangraham·
4.6 also wrote a few exploits. We found the cost of exploiting vulns was still 1 OOM higher than finding them. But that'll change fast. We need to be ready. We go into detail on one of the exploits on Red: red.anthropic.com/2026/exploit/
Logan Graham tweet media
English
1
34
161
23.6K
jle-k retweetledi
Joe Desimone
Joe Desimone@dez_·
Patch Diff to SYSTEM - using LLMs to exploit a LPE vuln on Windows. More importantly, some thoughts on model capabilities the implications on our security industry elastic.co/security-labs/…
Joe Desimone tweet media
English
3
73
262
19.6K
jle-k retweetledi
Yarden Shafir
Yarden Shafir@yarden_shafir·
FYI exploit devs, in future builds this exploit is blocked in two places: 1. Kernel addresses are no longer leaked: windows-internals.com/kaslr-leaks-re… 2. System DACLs are no longer writeable: x.com/33y0re/status/… (I hear there will be a blog post soon)
jle-k@_jle_k

Launched my blog with a quick exploit for CVE-2026-21241. Huge thanks to @Dark_Puzzle for finding the bug and @Bad_Jubies for diffing the patch. jle-k.com/blog/Exploitin…

English
2
38
235
22K
Yarden Shafir
Yarden Shafir@yarden_shafir·
@_jle_k @Dark_Puzzle @Bad_Jubies Nice work exploiting this! Blog is well written too. I’ll mention that the feature flag to de-restrict kaslr leaks should be gone soon if it isn’t yet, and corrupting system DACLs should no longer work in future versions (26H2+).
English
1
0
14
1.5K
jle-k retweetledi
Souhail Hammou
Souhail Hammou@Dark_Puzzle·
I've published the first entry in my new Windows vulnerability research series. It details how exploring Windows I/O completion internals led to uncovering a use-after-free in afd.sys (CVE-2026-21241). rce4fun.blogspot.com/2026/02/use-af…
English
3
39
151
11.4K