cleptho retweetledi
cleptho
9.4K posts

cleptho retweetledi

Our latest post details how we exploited Retbleed (a CPU vulnerability) to compromise a machine from a sandboxed process and VM!
Curious? 👇
bughunters.google.com/blog/624373010…
English
cleptho retweetledi

Check out our first blog post about V8 CVE-2024-12695: bugscale.ch/blog/dissectin…
English
cleptho retweetledi

looks like the AI + MCP-assisted reverse engineering hype train is gaining steam! 🚂✨
in just the past few days, we've seen:
• @itszn13 integrating MCP into @vector35’s Binary Ninja (x.com/itszn13/status…)
• @JH_Pointer casually dropping his IDA MCP project, which I had to nerdsnipe myself into trying (github.com/MxIris-Reverse…, x.com/bl4sty/status/…)
• @mrexodia rolling out a clean (judging by a quick code quality check) MCP implementation for IDA (github.com/mrexodia/ida-p…)
• @lauriewired dropping GhidraMCP for @NSAGov’s Ghidra (github.com/LaurieWired/Gh…)
these tools are early-stage but already hint at the potential for interactive RE software running on (semi) autopilot.
makes me wonder—should we formalize a set of MCP primitives across RE tools and unify them under one overarching framework? 🤔
of course, these aren’t silver bullets. but much like typical LLM usage, in the right hands, they could be powerful time-savers.
curious to see what comes next! might be time for hacking competitions focused on small/constrained binaries to start thinking about countermeasures against AI-assisted cheesing. 👀
itszn@itszn13
Claude reversing a binary using Binary Ninja via MCP while I get a snack @bl4sty @ziyadedher @vector35
English
cleptho retweetledi

I've just published a new blog post detailing how I developed a deterministic kernel exploit for iOS. Enjoy!
alfiecg.uk/2025/03/01/Tri…
English
cleptho retweetledi

I have posted the slides for the talk @chompie1337 and I gave this past weekend at @h2hconference -> The Kernel Hacker’s Guide to the Galaxy: Automating Exploit Engineering Workflows #H2HC
github.com/FuzzySecurity/…

English
cleptho retweetledi

Slides for my talk at @h2hconference 2024:
Diving into Linux kernel security 🤿
I described how to learn this complex area and knowingly configure the security parameters of your Linux-based system.
And I showed my open-source tools for that purpose!
a13xp0p0v.github.io/img/Alexander_…
English
cleptho retweetledi

Earlier this year, I used a 1day to exploit the kernelCTF VRP LTS instance. I then used the same bug to write a universal exploit that worked against up-to-date mainstream distros for approximately 2 months.
osec.io/blog/2024-11-2…

0xTen@_0xTen
76a62b975b1e12c82bc08343a891d7b138058320504bb38c43a3c6eecc8cb8ec ⛈️
English
cleptho retweetledi

Slides & video from our @GrehackConf talk "Attacking Hypervisors - A Practical Case" are online! Learn how we exploited vulnerabilities to escape VirtualBox during Pwn2Own Vancouver 2024: reversetactics.com/publications/2…
English
cleptho retweetledi

This research allowed me to find critical bugs in several electron applications by finding public n-day exploits for older versions of chrome and adapting them to the electron framework.
github.com/p3rr0x/Blog/tr…
#BugBounty
English
cleptho retweetledi
cleptho retweetledi

My WarCon slides about Ivanti Avalanche are public!
I tried to do some mapping of the attack-surface, show the new auth mechanism and present some research ideas (things I didn't try).
It also shows my first-ever fuzzing and memory corruption experience😆
github.com/thezdi/present…
English
cleptho retweetledi

DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks
Slides
usenix.org/system/files/u…
Paper
usenix.org/system/files/u…
Video
youtu.be/kc3qtpWkrkQ
usenix.org/conference/use…

YouTube

English
cleptho retweetledi

Dropped my slide for POC2024 on Linux kernel exploitation, including a journal from Pwn2Own Vancouver earlier this year. Enjoy 🙂.
u1f383.github.io/slides/talks/2…
English
cleptho retweetledi

Today I published my first #Rust #crate to crates.io!
crates.io/crates/rhabdom…
I’ll eventually publish an article on the @hnsec blog about it, but first there’s more work to do 💪
Many thanks to @xorpse for accepting my PRs to github.com/binarly-io/ida…
English
cleptho retweetledi
cleptho retweetledi

Here is the promised code and data of our binary analysis technique ReSym github.com/lt-asset/resym Honoured to received the #CCS2024 Distinguished Paper Award! @acm_ccs @cerias @PurdueCS #binaryanalysis #llm #llm4code
Lin Tan@Lin0Tan
Introducing ReSym (CCS'24): our binary analysis technique, an LLM+static analysis solution that recovers names, types, and layouts of variables and data structures from binaries tinyurl.com/resym24 @danning_x, @i2huer, @NanJiang719, @XiangzheX XiangyuZhang #LLM4code #CCS #LLM
English
cleptho retweetledi

@quarkslab And the exploits can be found here: github.com/quarkslab/sams…
English
cleptho retweetledi

THC RELEASE: 🎁Execute arbitrary backdoors 🚪on targets that do NOT allow execution 🙈 (noexec). Without ptrace() or mmap(). With only BASH _or_ PHP.👉Trick BASH to make (any)❗️SYSCALLS ❗️to the kernel. 🤪 #ISPScare
iq.thc.org/bypassing-noex…

English
cleptho retweetledi

A blog post with the technical details of my @hexacon_fr talk is now live. Thank you all for the positive feedback on the talk :)
Sonar Research@Sonar_Research
From HTTP request to ROP chain in Node.js! 🔥 Our latest blog post explains how to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only: sonarsource.com/blog/why-code-…
English


