HackSys Team

10.2K posts

HackSys Team

HackSys Team

@HackSysTeam

Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning

India شامل ہوئے Eylül 2012
639 فالونگ10.4K فالوورز
پن کیا گیا ٹویٹ
HackSys Team
HackSys Team@HackSysTeam·
🚨 We're hiring! 🚨 Hi everyone! HackSys Inc. is seeking an enthusiastic **Vulnerability Researcher** (Windows/Android/Browser) to join our team full-time — here in India! 🇮🇳🛡️ 👀 What we’re looking for: - Approximately **2+ years of experience** in hands-on vulnerability research - Strong understanding of **vulnerability classes**, C/C++/ASM - You've experimented with or exploited **n-days** on Windows, Android, or browsers - Reverse engineering capabilities using software such as **WinDbg, IDA, Ghidra** - Above all — a **true passion for breaking things to know them** 🔥 You live, eat, and breathe VR (the security variety 😉), we'd love to speak with you. 📬 Simply DM **@HackSysTeam** on Twitter or Discord for more information or to apply! #Hiring #CyberSecurity #VulnerabilityResearch #InfoSec #HackThePlanet
English
4
7
22
7.5K
HackSys Team ری ٹویٹ کیا
esjay
esjay@esj4y·
Here are the slides for my Scudo talk yesterday for the MobileHackingLab Con: github.com/3sjay/talks/bl… it has two extra slides I haven't addressed in my talk. One describing two common misconceptions and one showing the shuffle count for each class.
English
2
9
64
6.1K
HackSys Team ری ٹویٹ کیا
Alexandre Becholey
Alexandre Becholey@0xabe_io·
Started a blog series on writing a minimal ARM hypervisor from scratch — boots as a UEFI app, claims EL2, identity-maps everything through Stage 2. Chapter 0 just dropped: ARM vs x86 virtualization, UEFI internals, EDK2 setup, first app at EL2. 0xabe.io/hypervisor/arm…
English
2
52
230
12.7K
HackSys Team ری ٹویٹ کیا
Alisa Esage Шевченко
While y’all discounting your mediocre courses, @zerodaytraining is doubling down on my pro offers: - Foundations + Hypervisor = Escape Bundle (new) - Foundations + Browser = Remote Bundle (new) - Foundations + Hypervisor + Browser = Elite Bundle (new) That’s a full roadmap from zero to zero day engineer.
Zero Day Engineering@zerodayalpha

Winter Bundles are here ✨🎄✨ Bundles are one of our most requested features. Today, we've put together our best self-paced trainings to keep one's head cool on Christmas and well into 2026. Limited availability through mid January Details: zerodayengineering.com/winter-deals.h…

English
1
12
74
18.5K
HackSys Team ری ٹویٹ کیا
chompie
chompie@chompie1337·
Watch XOR’s talk CUDA de Grâce: Owning AI Cloud Infrastructure with GPU exploits Kernel + driver bugs aren’t just a LPE problem, they’re a cloud problem. With the explosion of AI in the cloud, NVIDIA’s GPU drivers have become a valuable attack surface youtu.be/Lvz2_ZHj3lo
YouTube video
YouTube
English
5
74
296
50.7K
HackSys Team ری ٹویٹ کیا
Bruce Chen
Bruce Chen@bruce30262·
Made a pwn challenge for this year’s HITCON CTF, which required participants to bypass PAC, BTI, and deal with relative vtables. Here’s the write-up: bruce30262.github.io/hitcon-ctf-202… Check it out if you're interested🙂
English
0
44
195
14.4K
HackSys Team ری ٹویٹ کیا
Ben
Ben@XploitBengineer·
I posted a short blog about how a Samsung GPU vulnerability (CVE-2025-21479) can be leveraged for an LPE on affected devices xploitbengineer.github.io/CVE-2025-21479
English
6
80
255
29.4K
HackSys Team ری ٹویٹ کیا
D4m0n
D4m0n@d4m0n_8·
It’s time to publish the blog post about the bug that won at P2O Berlin 2025. Enjoy! With this post, I mark my last moment as a researcher at @oobs_io. I’m moving on to a new place for a fresh start.🔥🦎 oobs.io/posts/four-byt…
English
1
62
187
19.6K
HackSys Team
HackSys Team@HackSysTeam·
@S4fv4nP @_c0c0n_ Appreciate it! Glad you enjoyed the session and huge congrats on winning the CTF! 👏🔥
English
0
0
1
250
HackSys Team ری ٹویٹ کیا
Safvan P
Safvan P@S4fv4nP·
Recently attended an amazing Windows Kernel Exploitation training at @_c0c0n_ by @HackSysTeam's Ashfaq Ansari! 🔥 Ashfaq was an incredible trainer - made complex kernel concepts easy to grasp. Also won the CTF! 🏆 Big thanks to Ashfaq and HackSysTeam! 🙏
English
1
1
4
964
HackSys Team ری ٹویٹ کیا
Crowdfense
Crowdfense@crowdfense·
Bidding farewell to one of the last Windows kernel address leaks, CVE-2025-53136 (KASLR bypass). Sometimes, even patches can open new doors for exploitation. crowdfense.com/nt-os-kernel-i…
English
1
29
84
21.6K
HackSys Team ری ٹویٹ کیا
Qrious Secure
Qrious Secure@qriousec·
Check out our newest blog about how we took advantage of a WebGPU feature to turn an integer underflow bug into an arbitrary read in Chrome’s WebGPU. This bug was fixed by Google long ago, but our ticket is still restricted. qriousec.github.io/post/oob-angle/ by @lanleft_ + @__suto
English
2
35
156
22.5K
HackSys Team ری ٹویٹ کیا
Pumpkin 🎃
Pumpkin 🎃@u1f383·
Last weekend, I participated in corCTF and solved the Android Pwn challenge - corphone. It was a great challenge, and I learned a lot from it. Here's my write-up :) u1f383.github.io/android/2025/0…
English
1
53
233
19.9K
HackSys Team ری ٹویٹ کیا
Alexander Popov
Alexander Popov@a13xp0p0v·
My new article: "Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel"⚡️ I tell a bug collision story and introduce my pet project kernel-hack-drill, which helped me to exploit the hard bug that received @PwnieAwards 2025 a13xp0p0v.github.io/2025/09/02/ker…
Alexander Popov tweet mediaAlexander Popov tweet media
English
4
85
260
34K
HackSys Team ری ٹویٹ کیا
j j
j j@mistymntncop·
Exploit and mini writeup for CVE-2025-5419. github.com/mistymntncop/C…
English
8
61
277
28.7K