y198

60 posts

y198

y198

@y198_nt

Carry water and peel oranges at Verichains Cyber Force

Katılım Ekim 2021
320 Takip Edilen61 Takipçiler
y198
y198@y198_nt·
@_sondt_ That just how the game goes, gotta accept the rules 😂
English
0
0
1
22
y198
y198@y198_nt·
Supposed to be my Pwn2Own entry this year, like everyone else, the queue was way too crowded. Turns out the hardest part wasn’t getting the exploit working...😭😭
y198 tweet media
English
4
1
60
3.8K
y198
y198@y198_nt·
@Zaddyzaddy The bug itself is unauth. The current exploit chain just uses an authenticated primitive to make the demo more reliable.
English
0
0
0
446
y198 retweetledi
Nicolas Krassas
Nicolas Krassas@Dinosn·
A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering. github.com/sjkim1127/Reve…
English
2
18
72
7K
y198 retweetledi
Ruikai Peng
Ruikai Peng@ruikai·
This is my debut hour-long talk on exploiting a heap-overflow in Llama.cpp RPC, when I was fifteen at ZeroCon. Enjoy:) research.pwno.io/llama-paradox
Ruikai Peng tweet media
English
1
23
100
9.2K
y198 retweetledi
TrendAI Zero Day Initiative
📦 Storage unlocked! Le Trong Phuc & Cao Ngoc Quy of Verichains Cyber Force just cracked the @Synology DS925+ at #Pwn2Own. A brief DNS issues delayed them, but they couldn't be stopped. They're off to the disclosure room to explain what they did. #P2OIreland
English
0
4
12
3.6K
y198 retweetledi
ö
ö@r0keb·
Good Morning! Just published a blog post diving into Windows Kernel LFH exploitation in the latest Windows 24h2 build, Focusing on controlled allocations to achieve arbitrary read/write in the kernel. r0keb.github.io/posts/Modern-(…
English
4
79
313
20.1K
y198 retweetledi
Zero Day Engineering
Zero Day Engineering@zerodayalpha·
Field echo detected! @alisaesage's "Fuzzing from First Principles" lecture dropped the seed – now it shapes reasoning and operations. That’s how structural insight moves. Full blog: 1day.dev/notes/Not-All-…
Zero Day Engineering tweet media
English
0
11
60
6.8K
y198
y198@y198_nt·
so far so gooooodddd 👀
y198 tweet media
English
0
0
1
95
y198 retweetledi
Crusaders of Rust
Crusaders of Rust@cor_ctf·
We are back😎 Say hello to our kernelCTF submission for CVE-2025-37752🩸 Who would have thought you could pwn a kernel with just a 0x0000 written 262636 bytes out of bounds? Read the full writeup at: syst3mfailure.io/two-bytes-of-m… 👀
English
0
54
201
11.4K
y198 retweetledi
Andrey Konovalov
Andrey Konovalov@andreyknvl·
Gave a talk on external fuzzing of Linux kernel USB drivers with syzkaller at SAFACon by @SAFATeamGmbH. Includes a demonstration of how to rediscover CVE-2024-53104, an out-of-bounds bug in the USB Video Class driver. Slides: docs.google.com/presentation/d…
Andrey Konovalov tweet mediaAndrey Konovalov tweet mediaAndrey Konovalov tweet media
English
3
55
220
19.4K
y198 retweetledi
j j
j j@mistymntncop·
My writeup for CVE-2024-7971. Just a POC. Let me know if u have any questions. github.com/mistymntncop/C…
English
9
64
248
21.2K
y198 retweetledi
Ivan Fratric 💙💛
Ivan Fratric 💙💛@ifsecure·
I shared an example earlier for fuzzing libxslt with Jackalope's grammar mutator. But Firefox has its own XSLT implementation, how do we fuzz browser code? The following .patch demonstrates how to do that. It is the setup that resulted in CVE-2025-1932. github.com/googleprojectz…
English
1
30
124
11.3K
y198 retweetledi
kind_killerwhale
kind_killerwhale@kind_k11rwhale·
Part 2 of the Fuzzilli IR series explores Opcodes.swift, Operation.swift, Program.swift, and Variable.swift. With the groundwork complete, the next post dives into the core of the IR engine. rpc.kr/posts/fuzzilli…
English
1
17
88
7.2K