ivx ๐Ÿ‘พ๐Ÿ’€ (@0xcrypto) 's Twitter Profile
ivx ๐Ÿ‘พ๐Ÿ’€

@0xcrypto

Hobbyist by profession.
Mastodon: infosec.exchange/@0xcrypto

ID: 4654449558

linkhttps://eval.blog calendar_today26-12-2015 09:48:41

470 Tweet

253 Followers

252 Following

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

It's confirmed! Ken Gannon / ไผŠ่—ค ๅ‰ฃ (@yogehi) of Mobile Hacking Lab, and Dimitrios Valsamaras (Dimitri Os) of Summoning Team (SummoningTeam) used five different bugs to exploit the #Samsung Galaxy S25. They earn $50,000 and 5 Master of Pwn points. #Pwn2Own

It's confirmed! Ken Gannon / ไผŠ่—ค ๅ‰ฃ (@yogehi) of Mobile Hacking Lab, and Dimitrios Valsamaras (<a href="/Ch0pin/">Dimitri Os</a>) of Summoning Team (<a href="/SummoningTeam/">SummoningTeam</a>) used five different bugs to exploit the #Samsung Galaxy S25. They earn $50,000 and 5 Master of Pwn points. #Pwn2Own
Aditya Anand (@aditya12anand) 's Twitter Profile Photo

There's been a lot of valid outrage about #SancharSaathi. Will they pull back? Is it just a false promise? We don't know. Hence, I created a thread on removing apps like these & other bloatware from your devices. P.S. Donate to Internet Freedom Foundation (IFF)!

There's been a lot of valid outrage about #SancharSaathi. 

Will they pull back? Is it just a false promise? We don't know. 

Hence, I created a thread on removing apps like these &amp; other bloatware from your devices. 

P.S. Donate to <a href="/internetfreedom/">Internet Freedom Foundation (IFF)</a>!
MobileHackingLab (@mobilehacklab) 's Twitter Profile Photo

๐Ÿšจ๐—ก๐—ฒ๐˜„ ๐— ๐—ผ๐—ฑ๐˜‚๐—น๐—ฒ ๐—–๐—ผ๐—บ๐—ถ๐—ป๐—ด: ๐—ฆ๐—ฐ๐˜‚๐—ฑ๐—ผ ๐—›๐—˜๐—”๐—ฃ ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป Scudo replaced the heap. Hardening went up. Old patterns stopped working. A Scudo Exploitation module is dropping in the coming weeks for Android Userland Fuzzing & Exploitation. Already enrolled?

MobileHackingLab (@mobilehacklab) 's Twitter Profile Photo

๐Ÿธ FREE Android Exploitation Lab An infinite runner game. Old Unity version. Subtle runtime flaws. Your goal: ๐ŸŽฎ Play ๐Ÿช Instrument ๐Ÿ’ฅ Exploit! No theory. Just hands-on hacking. ๐Ÿ‘‰ mobilehackinglab.com/course/lab-runโ€ฆ #AndroidSecurity #MobileHacking #AppSec #GameHacking #Frida

๐Ÿธ FREE Android Exploitation Lab

An infinite runner game.
Old Unity version.
Subtle runtime flaws.

Your goal:
๐ŸŽฎ Play
๐Ÿช Instrument
๐Ÿ’ฅ Exploit!

No theory. Just hands-on hacking.

๐Ÿ‘‰ mobilehackinglab.com/course/lab-runโ€ฆ

#AndroidSecurity #MobileHacking #AppSec #GameHacking #Frida
MobileHackingLab (@mobilehacklab) 's Twitter Profile Photo

๐Ÿšจ DJINI.AI IS LIVE! NEW website. NEW interface. And NEW crazy subscriptions with complementary MHL courses included! AI agents now help you: โšก static + dynamic testing, automated โšก fuzz native interfaces & JNI โšก auto-collect evidence + reports - incl.

MobileHackingLab (@mobilehacklab) 's Twitter Profile Photo

๐Ÿ˜จ From JSInterface bug to 1-click RCE and a 5-figure bounty... A while ago, our teammate Lyes found a vulnerability in an Android app that eventually earned a 5 figure bug bounty payout. Finding and validating the full chain manually took ~4 days, which later sparked a simple

๐Ÿ˜จ From JSInterface bug to 1-click RCE and a 5-figure bounty...

A while ago, our teammate Lyes found a vulnerability in an Android app that eventually earned a 5 figure bug bounty payout.

Finding and validating the full chain manually took ~4 days, which later sparked a simple
dawgyg - WoH (@thedawgyg) 's Twitter Profile Photo

"HackerOne Agentic PTaaS pairs specially trained AI agents"... specially trained on a decade worth of work from the largest pool of bug hunters on the planet.... without their consent... Maybe its time to find out how class action suits work and see if we have any ability to

Nadim Kobeissi (Moved to Bluesky) (@kaepora) 's Twitter Profile Photo

I'm hiring a research intern for summer 2026 to work with me on applied cryptography research projects. This is a paid, three-month, fully remote position. Check it out, and please spread the word! symbolic.software/blog/2026-03-1โ€ฆ

MobileHackingLab (@mobilehacklab) 's Twitter Profile Photo

We tried to hook Promon Shield's native layer. 3 attempts. 3 crashes. Every hook detected in real time. So we stopped hooking and changed the data instead. Part 2 is live: djini.ai/a-look-at-a-prโ€ฆ Shoutout to Ken Gannon (ไผŠ่—ค ๅ‰ฃ) for the amazing research. All driven by AI. ๐Ÿค– #infosec

s1r1us (@s1r1u5_) 's Twitter Profile Photo

from firefox blogpost where mythos found 270 new bugs: > The defects are finite, and we are entering a world where we can finally find them all it's like lord kelvin saying "there is nothing new to be discovered in physics now". can't tell if firefox has some incentives at play

from firefox blogpost where mythos found 270 new bugs:

&gt; The defects are finite, and we are entering a world where we can finally find them all

it's like lord kelvin saying "there is nothing new to be discovered in physics now". can't tell if firefox has some incentives at play
IRIS C2 (@c2iris) 's Twitter Profile Photo

If you were not capable of solving deep technical problems without AI, there is a slim chance that you'll be able to do so with AI

vx-underground (@vxunderground) 's Twitter Profile Photo

I am so incredibly tired of hearing about AI Everytime I look up anything cybersecurity related it's all a big ass fuck off circus discussing AI It's not even like, an explanation on AI, or some sort of deep dive, or nuanced perspective. It's all superficial and more akin to a