Lan Vu 🇻🇳

100 posts

Lan Vu 🇻🇳 banner
Lan Vu 🇻🇳

Lan Vu 🇻🇳

@lanleft_

she/her | coffee delivery at Qrious Secure @qriousec |

Vietnam شامل ہوئے Eylül 2019
459 فالونگ1.4K فالوورز
Lan Vu 🇻🇳 ری ٹویٹ کیا
Qrious Secure
Qrious Secure@qriousec·
One Repo x Codex/Claude Code/Cursor! by @trichimtrich
Português
0
4
39
8.6K
Lan Vu 🇻🇳
Lan Vu 🇻🇳@lanleft_·
Ye, I just turned a new age 😊
Lan Vu 🇻🇳 tweet media
English
0
0
31
1.6K
Lan Vu 🇻🇳 ری ٹویٹ کیا
Toan Pham
Toan Pham@__suto·
Not a single LLM can correctly explain the root cause even given the crash poc of this bug, let alone talk about how to write the exploit code. Kudo @lanleft_ for her great works! We may publish writeup when it no longer hot.
Qrious Secure@qriousec

@lanleft_ has convinced firefox GC to give her a shell 🤪

English
3
2
94
9.3K
Lan Vu 🇻🇳 ری ٹویٹ کیا
pr0cf5
pr0cf5@pr0cf51·
Last month, I gave a talk at @POC_Crew about ATLANTIS and the tech behind our #AIxCC win. We dove into competition details, using LLMs for deep bug discovery, and what's next for AI in security. github.com/pr0cf5/talks/b…
English
0
18
87
6.5K
Lan Vu 🇻🇳 ری ٹویٹ کیا
cts🌸
cts🌸@gf_256·
crazy find at the huawei store
English
131
388
9K
540.5K
Lan Vu 🇻🇳 ری ٹویٹ کیا
Years Progress
Years Progress@YearsProgress·
2025 is 91% complete.
Years Progress tweet media
English
25
737
3.7K
107.9K
Lan Vu 🇻🇳 ری ٹویٹ کیا
stephen
stephen@_tsuro·
If you like Chrome IPC shenanigans like this, you might also enjoy my talk from black hat 25: youtu.be/qhhJCLy0YBA?si…
YouTube video
YouTube
xvonfers@xvonfers

Whoah... $250000 (CVE-2025-4609, similar to CVE-2025-2783/412578726)[412578726][Mojo][IpczDriver]ipcz bug -> renderer duplicate browser process handle -> escape sbx is now open with PoC & exploit(success rate is nearly 70%-80%) issues.chromium.org/issues/4125787… #comment11" target="_blank" rel="nofollow noopener">issues.chromium.org/issues/4125787…

English
3
35
225
37.4K
Lan Vu 🇻🇳 ری ٹویٹ کیا
Samuel Groß
Samuel Groß@5aelo·
We released our Fuzzilli-based V8 Sandbox fuzzer: github.com/googleprojectz… It explores the heap to find interesting objects and corrupts them in a deterministic way using V8's memory corruption API. Happy fuzzing!
English
2
74
294
24.1K
Lan Vu 🇻🇳 ری ٹویٹ کیا
Off-By-One Conference
Off-By-One Conference@offbyoneconf·
Singapore - shout it out for Yuki Chen 🤩 !!! Bringing Day 1 of @offbyoneconf 2025 to a explosive end with 𝐀 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 𝐢𝐧𝐭𝐨 𝐖𝐢𝐧𝐝𝐨𝐰𝐬 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐒𝐮𝐩𝐩𝐨𝐫𝐭 𝐏𝐫𝐨𝐯𝐢𝐝𝐞𝐫 𝐈𝐧𝐭𝐞𝐫𝐟𝐚𝐜𝐞. 🙇🙇🙇
Off-By-One Conference tweet mediaOff-By-One Conference tweet mediaOff-By-One Conference tweet media
English
11
5
36
11.8K
Bien 🇻🇳
Bien 🇻🇳@bienpnn·
@lanleft_ @tacbliw the point is the book is about exploitation, i'm not talking about finding vuln so please don't downplay yourself. exploiting is an art by itself already
English
1
0
4
194
Lan Vu 🇻🇳
Lan Vu 🇻🇳@lanleft_·
@bienpnn @tacbliw no no no, not completely, I've only worked on the exploitation part so far, haven't found any vulnerability by myself yet, might be lack of this fundamenetal knowledge :D
English
1
0
1
139
Lan Vu 🇻🇳
Lan Vu 🇻🇳@lanleft_·
@tacbliw My friend gave me this book, I ended up quickly after first chapter and never picked it up again. It still sits untouched on my bookshelf xD
English
1
0
0
115
wildcat
wildcat@tacbliw·
@LiveOverflow For me it was the opposite. I read the first chapter, didn’t understand shit. Encouraged to learn more. Now I do binary exploit for a living, this book is still on my pc desktop to remind me to keep learing more 👀
English
1
0
6
1.1K
Lan Vu 🇻🇳 ری ٹویٹ کیا
Qrious Secure
Qrious Secure@qriousec·
Qrious Secure tweet media
ZXX
1
1
21
7.6K
Lan Vu 🇻🇳 ری ٹویٹ کیا
Qrious Secure
Qrious Secure@qriousec·
Santa gave us freshly new JSC 0day ✌️
Qrious Secure tweet media
English
2
4
95
14.4K
Lan Vu 🇻🇳
Lan Vu 🇻🇳@lanleft_·
Everytime working with opensource projects 🥲
Lan Vu 🇻🇳 tweet media
English
0
0
16
1.7K
Lan Vu 🇻🇳 ری ٹویٹ کیا
Qrious Secure
Qrious Secure@qriousec·
Our teammate @__suto has just pwned V8 JavaScript engine on Google's V8CTF version M120 using a 0-day exploit.
Qrious Secure tweet media
English
0
3
38
5K