59.4K posts

∞ banner
∞

@infenet

In 2004 I started coding video games in BASIC👴🏽. iOS reverse engineering pays the bills👨🏽‍💻. Addicted to fuzzing🍀. Perfecting my craft👨🏽‍🔬.

Cyber, Lobbycon Near You Katılım Kasım 2009
3.9K Takip Edilen4.7K Takipçiler
∞ retweetledi
vx-underground
vx-underground@vxunderground·
LeakBase admin "Chucky" was arrested. For those unfamiliar, LeakBase was this big ass fuck off website which sold, traded, auctioned, and freely distributed stolen data from compromised websites or companies. LeakBase audience was primarily Eastern European. Despite the wide spread identify theft, credit card fraud, extortion, initial access brokering, and money laundering that "Chucky" enabled, he was a nice guy. I used to send silly pictures of kitty cats to him.
English
49
134
2.4K
154.3K
∞ retweetledi
solst/ICE of Astarte
- XZ utils backdoor: found by guy debugging 200ms latency - LiteLLM hack: found by guy debugging oom issue These could have been the most impactful compromises ever. Forget security vendors, weaponize your engineers’ autism.
English
56
483
4.3K
145.3K
∞ retweetledi
Hermes Tool
Hermes Tool@Hermes_tooll·
iOS 18.6.1, iOS 18.6.2 - iOS 0-click CVE-2025-43300 Reverse engineering of Apple's iOS 0-click CVE-2025-43300: 2 bytes that make size matter The vulnerability seems to be located in the ImageIO.framework. Frameworks and functionalities are implemented blog.quarkslab.com/patch-analysis…
English
0
13
89
9.2K
∞ retweetledi
Brett Shavers 🙄
Brett Shavers 🙄@brettshavers·
1. Defense contractor L3Harris created iPhone spyware ("Coruna") for the U.S. government. 2. 3. Now it's in the hands of a Chinese cybercrime group. I'm curious about #2. #selection-647.0-655.78" target="_blank" rel="nofollow noopener">archive.is/h9OYm#selectio
English
5
63
306
34.8K
∞ retweetledi
amfi
amfi@amfi_d·
I'm reverse-engineering DarkSword and found that it supports 26 iPhone models with only 34,000 offsets. That's crazy.
English
4
8
215
19.5K
∞ retweetledi
Duy Tran
Duy Tran@khanhduytran0·
Just saying it is technically possible to get /var/mobile+MobileGestalt read/write and 3 app limit bypass using DarkSword kernel exploits, given the leaked fullchain showed that it managed to inject JavaScript into plenty of system processes. No eta on these though.
English
10
12
242
16.2K
∞ retweetledi
matteyeux
matteyeux@matteyeux·
Got kernel R/W on an iPad mini 6th gen running iOS 18.6.2 using the in the wild exploit chain darksword
matteyeux tweet media
English
25
73
685
68.9K
∞ retweetledi
Milk Road AI
Milk Road AI@MilkRoadAI·
The co-founder of one of America's biggest AI companies just got arrested by the FBI. His name is Wally Liaw and he co-founded Super Micro Computer in 1993. He sat on the board and he personally held $464 million in company stock. And prosecutors say he spent the last two years secretly shipping America's most powerful AI chips straight to China. Not one shipment but a systematic, coordinated operation. The scheme ran through a Southeast Asian shell company. Fake documents, fake buyers, and servers repackaged mid-route to conceal their true destination. When US compliance auditors showed up to inspect the warehouses, the real servers were already gone. They had been replaced with fake "dummy" servers built specifically to fool inspectors. In just three weeks in spring 2025, they shipped $510 million worth of restricted Nvidia hardware. $2.5 billion in banned AI servers delivered to China and here's where it gets darker. This isn't just one rogue executive. A documentary crew already found the underground network months ago, GPU smugglers stripping chips out of banned graphics cards, modifying them in garages, shipping them one by one across borders. A US based buyer was caught in Arizona meeting a contact in a Prius, testing GPUs in a car, with a spare license plate in the trunk. Street-level smugglers, shell companies in Southeast Asia, and now a co-founder with board access and a $464M stake. It's the same black market but just operating at every level simultaneously. The US has spent years trying to cut China off from the chips that power military AI, surveillance, and weapons systems. Liaw and his co-conspirators allegedly made that effort meaningless from the inside. He faces up to 20 years under the Export Control Reform Act plus additional charges for smuggling and defrauding the United States. One of his co-conspirators is still a fugitive and SMCI stock dropped nearly 15% after hours. The company itself says it wasn't named in the indictment. But the co-founder who built it, sat on its board, and ran business development was apparently running something else entirely on the side.
NIK@ns123abc

🚨BREAKING: SUPER MICRO CO-FOUNDER ARRESTED FOR SMUGGLING $2.5B IN NVIDIA GPUs TO CHINA >SMCI co-founder Yih-Shyan "Wally" Liaw arrested today >personally holds $464 MILLION in SMCI stock >charged with smuggling BILLIONS in Nvidia servers to china >used a southeast asian shell company to funnel $2.5B in servers to chinese buyers >$510 million worth shipped in just THREE WEEKS in spring 2025 >built thousands of fake dummy servers to fool U.S compliance auditors >caught on surveillance camera using a HAIR DRYER to swap serial number stickers >coordinated the whole thing over encrypted group chats >SMCI down 12% after hours >faces up to 30 years in federal prison ITS SO OVER…

English
54
277
1.1K
283.4K
∞ retweetledi
UwU Underground
UwU Underground@uwu_underground·
For everyone crypto-drained between July and now running an iPhone: the Coruna and DarkSword multi 0-day exploit kits timelines might explain some things. Apple iOS security isn't a walled garden anymore, its a silent sieve with PR working harder than security these days.
UwU Underground tweet media
English
10
43
191
11K
∞ retweetledi
Smukx.E
Smukx.E@5mukx·
Reverse engineering undocumented Windows Kernel features to work with the EDR TLDR; Reverse engineering Windows internals: because sometimes the best way to fix a problem is to take the operating system apart. fluxsec.red/reverse-engine…
Smukx.E tweet media
English
1
49
316
11.4K
∞
@infenet·
I heard this was used by Russia years ago at LAX.
English
0
0
0
304
∞
@infenet·
This divorce is taking longer to finalize than the wedding took to plan. 💔 never again.
English
0
0
0
363
∞ retweetledi
Mr. Creator
Mr. Creator@MrCreator1·
Coruna exploit is only useful for devices on older iOS versions. That means iOS 13-17 devices are ALL vulnerable to these powerful exploits for a jailbreak. A total of 23 exploits chained together. If you have locked devices with a passcode, we need a A12+ bootrom exploit. Otherwise we cannot pull activation tickets for iCloud bypass without updating. Also what WOULD be helpful is a SELF erase iOS exploit for devices that are passcode locked. Without it, passcode locked devices on these vulnerable versions are useless. iOS devices A12+ iOS 26.2+ we are still working on exploits. Some parts are working but it’s not complete by any means. Just sit and wait. I would honestly just wipe the passcode locked devices and leave them on iOS 26.2 for now and leave them in a drawer. This year I’m sure we will release A12 iOS 26.2+ We want 100% success
English
15
18
231
18.6K
∞ retweetledi
DbgMan ^_^
DbgMan ^_^@0XDbgMan·
Static Analysis for Windows Kernel Drivers using disassembly, symbolic execution,taint and Z3 to auto discover kernel vuln maps IOCTL , killer , ppl bypass surface, tracks user input to sensitive APIs, discovers ROP/JOP gadgets, and can even generate PoC exploits & fuzzers
DbgMan ^_^ tweet mediaDbgMan ^_^ tweet mediaDbgMan ^_^ tweet media
English
3
10
122
7.2K