ZheFox

123 posts

ZheFox banner
ZheFox

ZheFox

@cyberestro

Working on @Zeroverse_ai Lab | ChaMd5 Team | @r3kapig Team | Binary Security Researcher | APT hunting | Red&Blue Team | BlackHat Speaker

Solar System Katılım Ekim 2021
221 Takip Edilen712 Takipçiler
Sabitlenmiş Tweet
ZheFox
ZheFox@cyberestro·
Documenting the first time entering black hat.
ZheFox tweet media
English
1
0
18
2.3K
ZheFox
ZheFox@cyberestro·
Traditional cybersecurity was about paying humans. Modern cybersecurity is about paying AI.🙃
English
1
0
0
84
ZheFox
ZheFox@cyberestro·
@Lakr233 MIFARE Classic 1K/4K 似乎识别不出来
中文
0
0
0
310
砍砍.ᐟ
砍砍.ᐟ@Lakr233·
开源一个 NFC 的轮子,替换了我手上多年的老古董。 来玩!
砍砍.ᐟ tweet media
中文
29
30
441
103.4K
ZheFox
ZheFox@cyberestro·
@yetone 啥时候可以修改系统提示词,我好像没找到地方修改系统提示词
中文
0
0
0
75
ZheFox retweetledi
Zeroverse
Zeroverse@Zeroverse_ai·
Our AI Agent has conducted an in-depth analysis of the recently impactful OpenClaw 1-Click vulnerability🐞. Come check out our blog to learn more! zeroverse-ai.github.io/posts/openclaw…
English
2
5
5
1.4K
ZheFox retweetledi
Zeroverse
Zeroverse@Zeroverse_ai·
Our AI Agent quickly analyzed the GNU #InetUtils #telnetd USER environment variable injection vulnerability (CVE-2026-24061)🧐, which could lead to remote authentication bypass
Zeroverse tweet mediaZeroverse tweet mediaZeroverse tweet mediaZeroverse tweet media
English
0
4
7
1.9K
ZheFox retweetledi
Zeroverse
Zeroverse@Zeroverse_ai·
Our team is researching a novel vulnerability analysis AI Agent🥳. This is (part of) its report on the 🚨CVE-2025-68493 Apache #Struts2 vulnerability🧐
Zeroverse tweet mediaZeroverse tweet mediaZeroverse tweet mediaZeroverse tweet media
English
2
5
8
1.4K
ZheFox
ZheFox@cyberestro·
@yetone windows,windows,windows,重要的事情说三遍
中文
0
0
1
558
yetone
yetone@yetone·
我今天给大家测一下这个 workflow
BadUncle@BadUncleX

群友说反重力antigravity的opus4.5很耐用,约等于claude code 50刀的额度。 既然Opus 4.5量大,既然alma ( alma[dot]now via @yetone ) 可以把服务代理拦截出来,那可以测试一下alma导出的反代拿到cc里用。 适合cc被封的兄弟。 这事很久以前我用github copilot的sonnet测试过,可惜当时ithub的量并不足。 (我未测试,不包熟)

中文
12
4
150
39.7K
ZheFox
ZheFox@cyberestro·
@tjbecker Thank you for your answer. It's crazy. congratulations!
English
0
0
1
63
Tim Becker
Tim Becker@tjbecker·
We just debuted Xint Code, our new code analysis tool building on work from on our AIxCC submission in August. With zero human intervention, it found critical 0day RCE bugs in Redis, PostgreSQL, and MariaDB – sweeping the database category and beating out every human team.
Wiz@wiz_io

Final day at zeroday.cloud was W1LD.🧑‍💻 Today’s successful exploits >> RCEs in Redis (x2), PostgreSQL, and MariaDB - all demonstrated live on stage. Congrats to XINT Code for being the zeroday.cloud CHAMPIONS!

English
5
14
86
25.7K
yetone
yetone@yetone·
12 月份突发高亮
yetone tweet media
日本語
3
1
64
11.5K
Danis Jiang
Danis Jiang@danis_jiang·
Had another VMware VM escape talk at BlackHat today. Hope you found it interesting😉. I’ll let you know when the slides are available. #BHUSA #BlackHatEvent #VMware
Danis Jiang tweet mediaDanis Jiang tweet mediaDanis Jiang tweet mediaDanis Jiang tweet media
English
6
24
359
21.8K
VictorV
VictorV@vv474172261·
Honored to hit #1 😁 Huge thx to @msftsecresponse for the support & to my friends for the lifts 🚀 Thanks to @guhe120 and @XiaoWei___ for their guidance and sharing🤗 Congrats to everyone on the board! 🎉
Microsoft Security Response Center@msftsecresponse

The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s 100 Most Valuable Researchers (MVRs), based on the total number of points earned for each valid report. Please join us in celebrating this year’s MVRs, including our top 10: 1. 🥇 VictorV (@vv474172261) 2. 🥈 wkai 3. 🥉 Suresh Chelladurai 4. Anonymous 5. Adnan (@adnanthekhan) 6. Dhiral Patel (@dhiralpatel94) 7. Nan Wang (@eternalsakura13) and Ziling Chen 8. Anonymous 9. @0x140ce 10. Azure Yang (@4zure9) See the full list of this year’s 100 MVRs, in addition to our Azure, Office, Windows, and Dynamics 365 leaderboards: msft.it/6011s6KxU #bugbounty

English
11
2
71
5.6K
ZheFox
ZheFox@cyberestro·
@mortiest_ricky 已经上线了吗,好家伙,刚体验了一下,这套渲染做的有点意思,很丝滑
中文
0
0
1
129
Transistor
Transistor@mortiest_ricky·
如果你的产品从上线就开始收费,你会收获一堆付费用户有以及每天源源不断的收款通知;但如果你想做做慈善免费推广,那可就不妙辣,你就会遇到图中这种傻逼,不仅要白嫖逆向你的接口,还要骑你脸上拉屎。
Transistor tweet media
中文
2
0
19
3.2K
ZheFox
ZheFox@cyberestro·
@seanhn I attempted to reproduce this on kernel version 5.19. It appears the trigger point is somewhat different, and the underlying cause also differs from what the AI described. lol
English
0
0
0
69
Sean Heelan
Sean Heelan@seanhn·
I wrote-up how I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation. Link to the blog post below 👇
English
23
181
911
98.8K