kabal089
1.5K posts

kabal089
@kabal089
Vulns, sploits and AMIGAAAA. Research @ Interrupt Labs. pwn2own 23,26. Thoughts mine
United Kingdom Katılım Ocak 2018
1.5K Takip Edilen121 Takipçiler

BOTTLED IT AGAIN, BOTTLED IT AGAIN, BOTTLED IT AGAIN OLE OLE

Fabrizio Romano@FabrizioRomano
🏆🔵 MANCHESTER CITY WIN THE LEAGUE CUP AT WEMBLEY VS ARSENAL! Nico O’Reilly show with a brace. 💥💥 Who’s been your Man of the Match?
English
kabal089 retweetledi

#Zer0Con2026 - SPEAKER 🤖
Georgi G(@munmap) & Ben R(@XploitBengineer) from Interrupt Labs - “Promp2Pwn - LLMs Winning at Pwn2Own”
For more: zer0con.org

English
kabal089 retweetledi

We loved meeting everyone and running our IoT hacking workshop at misc0nfig this weekend!
Thank you to everyone at @warwickcybersoc and CyberWomen@Warwick for their organisation of such a great event!


English

A big change of pace for my security research:
I'm now working @OpenAI to build on and improve GPT's ability to detect and remediate complex vulnerabilities
@daveaitel and a lot of other brilliant people
Excited to see where this goes, lots of ideas to try...
English

@blind_via These are real old now, pick up the DHO804 and unlock it for 200mhz
English
kabal089 retweetledi

May I present to you; a full copy of doom, running inside of a Rollercoaster Tycoon 1 save game exploit ✨
Thanks for everyone that came to check out our @DistrictCon Junkyard talk! We had a lot of fun putting it together. (check the thread for slides / exploit)
English
kabal089 retweetledi

$1,047,000 USD - 76 unique 0-day vulnerabilities - three days of incredible research on display. #Pwn2Own Automotive 2026 had it all: bold exploits, clever techniques, and collisions. Congrats to Fuzzware.io (@ScepticCtf, @diff_fusion, @SeTcbPrivilege), Master of Pwn with $215,500 and 28 points! #P2OAuto

English
kabal089 retweetledi

📣WE’RE HIRING ENTRY LEVEL RESEARCHERS📣
Are you experienced in VR hobby projects, CTFs and general hackery and looking to transform this into a career? Apply today!
📅Flexible start date - suitable for students graduating this summer
interruptlabs.teamtailor.com/jobs/7028051-a…
English
kabal089 retweetledi

Check out our new ‘Early Careers’ site!
A handy guide for aspiring vulnerability researchers that includes insights into working in VR and tips for breaking into the industry.
You can also find and apply for our entry-level roles.
interruptlabs.teamtailor.com/pages/early-ca…
English
kabal089 retweetledi

I posted a short blog about how a Samsung GPU vulnerability (CVE-2025-21479) can be leveraged for an LPE on affected devices
xploitbengineer.github.io/CVE-2025-21479
English
kabal089 retweetledi

Absolutely buzzing!
The moment @XploitBengineer and @munmap successfully pwned the Samsung Galaxy S25 at @thezdi Pwn2Own!
youtube.com/live/pFPhdBcyy…

YouTube
English
kabal089 retweetledi

📣 The latest instalment of our VR Development Programme resources is now available on YouTube! 📣
An introduction to ARM64, ARM32 and x86-64 assembly for vulnerability research.
youtube.com/watch?v=c7utLP…

YouTube
English

@SuspendedDoll1 That Christmas. Some years I bring that game out, nostalgia walking around dobuita. Such a defining game
English

@alexjplaskett I rooted and dumped /proc/cmdline and my bootargs all look good so I am not sure where the difference is. I can remove most uBoot vars and the kernel will boot, so I have isolated bootargs as the problem. Either that or my uBoot does check the return value and panic?
English

@alexjplaskett Thanks appreciate it. So I got the uBoot stored environment loaded from 0x500000 but as soon as I pull the bootargs ro trick it resets. I moved both kernel parts to a higher offset and that boots fine without changing bootargs. This is on quite old Era 100 firmware.
English

kabal089 retweetledi

I am developing a dirt cheap hardware to perform voltage glitching attacks: mkesenheimer.github.io/blog/pico-glit…

English
kabal089 retweetledi








