winterknife 🌻

909 posts

winterknife 🌻 banner
winterknife 🌻

winterknife 🌻

@_winterknife_

low-level developer with a focus on 𝙸𝚗𝚝𝚎𝚕 𝚡𝟾𝟼 ISA devices running 𝚆𝚒𝚗𝚍𝚘𝚠𝚜 | R&D @BHinfoSecurity | https://t.co/lyJL0y7qRZ

Coruscant Katılım Haziran 2017
5K Takip Edilen5.1K Takipçiler
winterknife 🌻 retweetledi
Mandiant (part of Google Cloud)
Google Threat Intelligence Group has identified DarkSword, a new iOS exploit chain leveraging six zero-day vulnerabilities. Multiple threat actors are actively using it to deploy malware payloads. Update your devices or enable Lockdown Mode. 👉 bit.ly/4bRveEz
Mandiant (part of Google Cloud) tweet media
English
3
68
206
19.2K
winterknife 🌻 retweetledi
wetw0rk
wetw0rk@wetw0rk7·
Interested in exploiting browsers? Join me as I go over the free section of @ret2wargames "Fundamentals of Browser Exploitation" course. This is a course delivered by real #Pwn2Own winners! So, you're learning from the best! This first video is very beginner friendly so check it out even if you're just curios🧐. Video link below: youtu.be/5ArMYqwCmD4
YouTube video
YouTube
English
1
36
210
10.4K
winterknife 🌻 retweetledi
Mateusz Krzywicki
Mateusz Krzywicki@krzywix·
In collaboration with Lookout and Google (thank you 🙏) we have been working on tearing down and building detections for DarkSword - iOS exploit chain for iOS 18.4 - 18.7. Super excited for this research 🎉. Please update your iPhones. iverify.io/blog/darksword…
English
15
82
336
76.9K
winterknife 🌻 retweetledi
Origin
Origin@originhq·
Windows Insider builds now have a native, OS-level broker for MCP servers. We reverse engineered Odr.exe to understand how it validates clients, manages consent, and controls access - uncovering undocumented COM interfaces and a full ETW audit trail. originhq.com/blog/msft-odr-…
English
2
25
58
5.3K
winterknife 🌻 retweetledi
Taszk Security Labs
Taszk Security Labs@TaszkSecLabs·
Now You See mi - Now You're Pwned: Exploiting Xiaomi Smart Cameras for fun and credit labs.taszk.io/articles/post/… Our intern's research post is up, full code of an RCE exploit + a "cloud jailbreak" released with it. After embargo expiry, 3 vulnerabilities currently remain unfixed.
English
2
41
139
8.7K
winterknife 🌻 retweetledi
LaurieWired
LaurieWired@lauriewired·
In case you missed my RE//verse keynote about compilers and reverse engineering, it's now available online!
LaurieWired tweet media
English
20
87
1.4K
39.3K
winterknife 🌻 retweetledi
Ido Veltzman
Ido Veltzman@Idov31·
A new post (with a new website design) is finally out: idov31.github.io/posts/hypervis…. After two years, I wanted to start posting again and really wanted to share something that contains some technical details about hypervisors, my opinions on utilizing hypervisors for defense and 1/2
English
2
14
53
5.1K
winterknife 🌻 retweetledi
OpenSecurityTraining2
OpenSecurityTraining2@OpenSecTraining·
Move from basic fuzzing to a high-performance workflow. Fuzzing 1001 ost2.fyi/Fuzz1001 bridges the gap between theory and practical research. Master AFL++, PCGUARD, LTO, and ASAN using real CVEs from Xpdf and tcpdump.
English
0
25
122
7.1K
winterknife 🌻
winterknife 🌻@_winterknife_·
Another C++ trick to prevent long string literals from being placed in the .rdata section when building shellcode, regardless of the optimization level. godbolt.org/z/ssxT8qes8
English
0
9
96
6.8K
winterknife 🌻 retweetledi
Justas Masiulis
Justas Masiulis@JustasMasiulis·
TIL FILE_READ_ACCESS is not mandatory to map a SEC_IMAGE into memory.
Justas Masiulis tweet media
English
1
18
112
10.5K
winterknife 🌻 retweetledi
Tom Hegel
Tom Hegel@TomHegel·
Coruna iOS Exploit kit is one of those stories where the more you dig the weirder it gets. I love it.. Started as surveillance vendor tooling, ended up in mass Chinese crypto scams, and this week someone registered Iran war-themed dropper domains. Full timeline thread. 🧵
English
5
53
197
32.6K
winterknife 🌻 retweetledi
Mandiant (part of Google Cloud)
Coruna exploit kit is targeting iOS. Coruna leverages 23 exploits against Apple devices running iOS 13-17.2.1. It is being used for espionage, and by financially motivated actors to steal crypto. Update your iOS devices, and learn more about this threat: bit.ly/4rbeltc
Mandiant (part of Google Cloud) tweet media
English
7
119
360
116.8K
winterknife 🌻 retweetledi
Alexandre Becholey
Alexandre Becholey@0xabe_io·
Started a blog series on writing a minimal ARM hypervisor from scratch — boots as a UEFI app, claims EL2, identity-maps everything through Stage 2. Chapter 0 just dropped: ARM vs x86 virtualization, UEFI internals, EDK2 setup, first app at EL2. 0xabe.io/hypervisor/arm…
English
2
52
230
12.7K
winterknife 🌻 retweetledi
expy
expy@expend20·
Ported Polaris-Obfuscator from C++/LLVM 16 to Python on LLVM 21. 9 passes: encrypted flattening, modular-arithmetic predicates, pointer mazes, function merging, and an X86 MIR pass that makes IDA's decompiler hallucinate variables that never existed. shifting.codes/blog/polaris-o…
English
0
13
78
6.2K
winterknife 🌻 retweetledi
Matt Hand
Matt Hand@matterpreter·
I'm excited to finally release Marco, a research tool for modeling complex control flows across binaries. originhq.com/blog/introduci…
English
4
30
72
6.3K