Eugene Rodionov

1.1K posts

Eugene Rodionov banner
Eugene Rodionov

Eugene Rodionov

@vxradius

Security Researcher

Katılım Eylül 2010
1.1K Takip Edilen5.4K Takipçiler
Eugene Rodionov retweetledi
Alexander Popov
Alexander Popov@a13xp0p0v·
My new article: "Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel"⚡️ I tell a bug collision story and introduce my pet project kernel-hack-drill, which helped me to exploit the hard bug that received @PwnieAwards 2025 a13xp0p0v.github.io/2025/09/02/ker…
Alexander Popov tweet mediaAlexander Popov tweet media
English
4
85
260
33.9K
Eugene Rodionov retweetledi
Alexander Popov
Alexander Popov@a13xp0p0v·
Slides for my talk at @h2hconference 2024: Diving into Linux kernel security 🤿 I described how to learn this complex area and knowingly configure the security parameters of your Linux-based system. And I showed my open-source tools for that purpose! a13xp0p0v.github.io/img/Alexander_…
English
5
79
261
27.4K
Eugene Rodionov retweetledi
Alex Rebert
Alex Rebert@ayper·
Excited to share our latest post on memory safety! We're tackling spatial safety in our massive C++ codebase by hardening libc++ *by default*. It adds bounds checks to things like std::vector, preventing a fair bit of out-of-bounds vulnerabilities: security.googleblog.com/2024/11/retrof…
English
2
50
249
76.9K
Eugene Rodionov retweetledi
spaceraccoon | Eugene Lim
spaceraccoon | Eugene Lim@spaceraccoon·
“Break into the world of vulnerability research... and become a zero-day hunter.” I have a new book with @nostarch! Behind the curtain of zero-day research, there are fundamental building blocks you can learn. In early access now and out in Spring 2025! nostarch.com/zero-day
English
21
135
620
40.9K
Eugene Rodionov retweetledi
Rodrigo Branco
Rodrigo Branco@bsdaemon·
A while ago I've given a talk on how to build exceptional security research teams: github.com/rrbranco/Prese… - I continue convinced that is all that is needed. The adage "Great people leave managers, not companies" continues to be true.
English
2
29
126
13K
Eugene Rodionov retweetledi
Oliver Chang
Oliver Chang@halbecaf·
CVE-2024-9143 (openssl-library.org/news/secadv/20…) was disclosed recently, which was found by OSS-Fuzz-Gen! This is a pretty proud example of our team showing the promise of leveraging LLMs enable more fuzzing coverage.
English
0
23
122
46.7K
Eugene Rodionov retweetledi
Klecko
Klecko@klecko0·
I've written a post on SELinux and some public bypasses for Android kernel exploitation. It's especially relevant for Samsung and Huawei devices due to their use of hypervisors. Check it out here: klecko.github.io/posts/selinux-…
English
10
127
415
37.4K
Eugene Rodionov retweetledi
Alex Matrosov
Alex Matrosov@matrosov·
IDAlib is the first idiomatic Rust bindings library for @HexRaysSA IDA SDK, helping go beyond C/C++ or Python in RE automation. Huge thanks to @xorpse for making it happen! Binarly team ❤️ Rust 🙌 🛠️use idalib::idb::*; 🦀crates.io/crates/idalib
BINARLY🔬@binarly_io

Our REsearch team is thrilled about the new IDA v9.0! #efiXplorer is fully compatible with v9.0 and still supports IDA v8.4🚀 🔬github.com/binarly-io/efi… We are thrilled to announce IDAlib — idiomatic Rust bindings for the IDA SDK 🎉 Kudos to @xorpse! ⚙️github.com/binarly-io/ida…

English
1
26
80
11.1K
Eugene Rodionov retweetledi
Alex Matrosov
Alex Matrosov@matrosov·
💥PoC is now public! target = "https://{ip_address}/cgi/login.cgi" command = "touch /tmp/BRLY" libc = 0x76283000 # we try to guess gadget1 = 0x000D8874 # pop {r0, r1, r2, r3, fp, pc}; gadget2 = 0x001026D4 # mov r0, sp; blx r3; system = 0x0003C4D4 github.com/binarly-io/Too…
BINARLY🔬@binarly_io

🚨New! "CVE-2024-36435 Deep-Dive: The Year’s Most Critical BMC Security Flaw." 🔥Classic buffer overflow vulnerabilities resurface in BMCs, remotely opening the gates from the castle. 🏆Kudos to @AlexTereshkin for the initial discovery and disclosure! binarly.io/blog/cve-2024-…

English
4
92
269
60.4K
Eugene Rodionov retweetledi
Jeff Vander Stoep
Jeff Vander Stoep@jeffvanderstoep·
I’m super excited about this blogpost. The approach is so counterintuitive, and yet the results are so much better than anything else that we’ve tried for memory safety. We finally understand why. security.googleblog.com/2024/09/elimin…
English
6
74
276
54.6K
Eugene Rodionov
Eugene Rodionov@vxradius·
Exciting story on collaboration between Google Android Offsec and ARM product security on proactively securing Mali GPU attack surface in Android and beyond. Among proactively identified and mitigated issues is CVE-2024-0153 in GPU firmware.
Royal Hansen@royalhansen

We teamed up with @Arm to boost GPU security on #Android!  Fuzzing, firmware analysis, and close collaboration led to key vulnerability discoveries and a stronger #Android ecosystem. Read more in our joint blog: security.googleblog.com/2024/09/google…

English
0
6
22
2.6K