
patate
254 posts


@0xocdsec @ScottyBauer1 Any poc for those cross socs exploit maybe?
English


@ScottyBauer1 Some sites say ITW. Christmas time up until March feels like big time spyware shop. Usually 6 months from here until parties will admit.
English

@matteyeux Happy to see people still maintaining our project, thanks a lot for this!
English

@ScottyBauer1 @b1ack0wl @ScottyBauer1, shoot me a message when you'll manage to land a QPSI commit on P4, I might reapply!
English

@b1ack0wl maybe ill change that string to "go away vr-x-dev"
English

@ScottyBauer1 @XploitBengineer Why did it never land? Sounds like a good mitigation
English

@XploitBengineer Nice work. 2 or 3 years ago I tried to get the team to take a mitigation to prevent rogue SMMU_TABLE_UPDATE's -- it never made it in. Essentially KGSL would only allocate KGSL first level page tables from a specific region. KGSL would notify the ucode of this region at boot.
English

I posted a short blog about how a Samsung GPU vulnerability (CVE-2025-21479) can be leveraged for an LPE on affected devices
xploitbengineer.github.io/CVE-2025-21479
English
patate retweetledi
patate retweetledi

Absolutely buzzing!
The moment @XploitBengineer and @munmap successfully pwned the Samsung Galaxy S25 at @thezdi Pwn2Own!
youtube.com/live/pFPhdBcyy…

YouTube
English
patate retweetledi
patate retweetledi

NEED YOUR HELP!
My Friend/Teacher Soroush (@irsdl) Is looking for a new company to join, you know him as the .NET-God, the guy who has popped exchange, sharepoint, has maintained ysoserial_.net for years, contributed to the exploitation scene numerous times, taught all of you about what .net ghost webshells are, taught you about what viewstate exploitation is, how .net remoting exploitation issues can be solved, iis cookieless, web_config exploitation, countless of blogs, talks, techniques,...
but companies keep saying:
"we aren't hiring right now!"
if i was in position of hiring, woudln't wanna miss out on having one of THE BEST in my team
you're retweet is Extremely appreciated ❤️🔥
soroush, if you see this, don't hate me, had to do it without telling you
English
patate retweetledi
patate retweetledi

📢The end of Hexacon's CFP is approaching (July 14th)!
If you have technical content you would like to present in Paris, you have another ~11 days to send it in ✍️
Topics of interest are vr / xdev / hardware hax, appsec & offensive security in general 🐛🐜🪲
See you there!👋
Hexacon@hexacon_fr
We've already received many high-quality submissions to our CFP, thank you! 🚀 Don't miss your chance to submit before July 14! 📅 hexacon.fr/conference/cal…
English
patate retweetledi

#OffensiveCon25 videos are now up!
youtube.com/playlist?list=…
English
patate retweetledi

A fantastic opportunity for an experienced vulnerability researcher to join our word-class Browsers team. Remote work, hybrid or in office opportunities available.
Check out our careers page for the full range of roles available globally.
buff.ly/4apXYC1
English
patate retweetledi

Come for a chat at @DistrictCon to hear about all the exciting things @InterruptLabs is working on. Who doesn’t want to work alongside these legends…. @munmap @maxpl0it
DistrictCon@DistrictCon
We are thrilled to present our Founding Sponsors for @DistrictCon Year 0! Each Sponsor and Partner is helping us create great content for you. Thank you to each organization for helping us put on the first DistrictCon!
English
patate retweetledi

The past year has been amazing. From marriage, to Pwn2Own to a Pwnie Award, I'm so grateful. I'm using the money I've won from hacking competitions, bounties, & RB for two ppl to travel & attend Hexacon, the premier offensive security con in Paris, France. forms.gle/zt9RaR7EEvTxWG…
English

I consider all the participants with a pwn2own Xiaomi entry winning this indirect @PwnieAwards @InterruptLabs
Kevin2600@Kevin2600
Congrats to lamest vendor Xiaomi 我们的小米朋友在吗 上台领奖啦 :D
English














