0xor0ne (@0xor0ne) 's Twitter Profile
0xor0ne

@0xor0ne

| CyberSecurity | Reverse Engineering | C and Rust | Exploit | Linux kernel | PhD | My Tweets, My Opinions :) |

ID: 1293289704843075586

linkhttps://github.com/0xor0ne calendar_today11-08-2020 20:54:59

2,2K Tweet

62,62K Followers

528 Following

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Leaking the MTE tags from arbitrary memory addresses through speculative execution arxiv.org/pdf/2406.08719 #infosec #Linux

Leaking the MTE tags from arbitrary memory addresses through speculative execution

arxiv.org/pdf/2406.08719

#infosec #Linux
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Bootstrapping security analysis of Arlo cameras (IoT devices) synacktiv.com/en/publication… Credits Thomas Jeunet (Synacktiv) #infosec #embedded

Bootstrapping security analysis of Arlo cameras (IoT devices)

synacktiv.com/en/publication…

Credits Thomas Jeunet (<a href="/Synacktiv/">Synacktiv</a>)

#infosec #embedded
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Beginners intro to Linux kernel exploitation (env setup and ret2usr) Part 1: scoding.de/linux-kernel-e… Part 2: scoding.de/linux-kernel-e… #Linux #cybersecurity

Beginners intro to Linux kernel exploitation (env setup and ret2usr)

Part 1: scoding.de/linux-kernel-e…
Part 2: scoding.de/linux-kernel-e…

#Linux #cybersecurity
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Collection of links to write-ups, blog posts and papers related to cybersecurity, reverse engineering and exploitation (constantly updated) github.com/0xor0ne/awesom… #infosec #cybersecurity

Collection of links to write-ups, blog posts and papers related to cybersecurity, reverse engineering and exploitation (constantly updated)

github.com/0xor0ne/awesom…

#infosec #cybersecurity
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Hack and unlock the Amazon Fire HD6 / HD7 (MediaTek MT8135) blog.r0rt1z2.com/hacking-a-2014… Blog post by Roger #infosec #embedded

Hack and unlock the Amazon Fire HD6 / HD7 (MediaTek MT8135)

blog.r0rt1z2.com/hacking-a-2014…

Blog post by <a href="/r0rt1z2/">Roger</a>

#infosec #embedded
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Intro to Satellite hacking concepts and CTFs Satellite Hacking Demystified: redteamrecipe.com/satellite-hack… Hack-a-sat writeups: github.com/solar-wine/wri… Hack-a-sat players corner: hackasat.com/players-corner/ #cybersecurity #satellite

Intro to Satellite hacking concepts and CTFs

Satellite Hacking Demystified: redteamrecipe.com/satellite-hack…
Hack-a-sat writeups: github.com/solar-wine/wri…
Hack-a-sat players corner: hackasat.com/players-corner/

#cybersecurity #satellite
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Intro to Satellite hacking concepts and CTFs Satellite Hacking Demystified: redteamrecipe.com/satellite-hack… Hack-a-sat writeups: github.com/solar-wine/wri… Hack-a-sat players corner: hackasat.com/players-corner/ #cybersecurity #satellite

Intro to Satellite hacking concepts and CTFs

Satellite Hacking Demystified: redteamrecipe.com/satellite-hack…
Hack-a-sat writeups: github.com/solar-wine/wri…
Hack-a-sat players corner: hackasat.com/players-corner/

#cybersecurity #satellite
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Defeating VM obfuscation using symbolic execution (fsvm from openECSC 2024) blog.deobfuscate.io/using-symbolic… #infosec #reverseengineering

Defeating VM obfuscation using symbolic execution (fsvm from openECSC 2024)

blog.deobfuscate.io/using-symbolic…

#infosec #reverseengineering
0xor0ne (@0xor0ne) 's Twitter Profile Photo

FortiGate firewalls: bare metal firmware encryption reverse engineering bishopfox.com/blog/breaking-… Credits Jon Williams (Bishop Fox) #cybersecurity #Fortinet

FortiGate firewalls: bare metal firmware encryption reverse engineering

bishopfox.com/blog/breaking-…

Credits Jon Williams (<a href="/bishopfox/">Bishop Fox</a>)

#cybersecurity #Fortinet
0xor0ne (@0xor0ne) 's Twitter Profile Photo

A few notes on dealing with binaries for embedded devices research.nccgroup.com/2024/06/05/cro… Credits Domen Puncer Kugler (NCC Group Research & Technology) #infosec #Linux

A few notes on dealing with binaries for embedded devices

research.nccgroup.com/2024/06/05/cro…

Credits Domen Puncer Kugler (<a href="/NCCGroupInfosec/">NCC Group Research & Technology</a>)

#infosec #Linux
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Intro to windows kernel exploitation Part 1: mdanilor.github.io/posts/hevd-0/ Part 2: mdanilor.github.io/posts/hevd-1/ Part 3: mdanilor.github.io/posts/hevd-2/ Part 4: mdanilor.github.io/posts/hevd-3/ Part 5: mdanilor.github.io/posts/hevd-4/ #infosec #windows

Intro to windows kernel exploitation

Part 1: mdanilor.github.io/posts/hevd-0/
Part 2: mdanilor.github.io/posts/hevd-1/
Part 3: mdanilor.github.io/posts/hevd-2/
Part 4: mdanilor.github.io/posts/hevd-3/
Part 5: mdanilor.github.io/posts/hevd-4/

#infosec #windows
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Musl c library Heap allocator exploitation (CVE-2022-24834) research.nccgroup.com/2024/06/11/pum… Credits Aaron Adams (NCC Group Research & Technology) #exploit #cybersecurity

Musl c library Heap allocator exploitation (CVE-2022-24834)

research.nccgroup.com/2024/06/11/pum…

Credits Aaron Adams (<a href="/NCCGroupInfosec/">NCC Group Research & Technology</a>)

#exploit #cybersecurity
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Debugging, profiling and tracing Linux kernel Slides: bootlin.com/doc/training/d… Lab exercises: bootlin.com/doc/training/d… Lab material (.tar.xz): bootlin.com/doc/training/d… Training material by Bootlin #Linux #cybersecurity

Debugging, profiling and tracing Linux kernel 
 
Slides: bootlin.com/doc/training/d…
Lab exercises: bootlin.com/doc/training/d…
Lab material (.tar.xz): bootlin.com/doc/training/d…

Training material by <a href="/bootlincom/">Bootlin</a>

#Linux #cybersecurity
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Two part series on security analysis and exploitation of the Phoenix Contact CHARX SEC-3100 charging controller Part 1: blog.ret2.io/2024/07/17/pwn… Part 2: phoenixcontact.com/en-us/products… Credits RET2 Systems #automotive #cybersecurity

Two part series on security analysis and exploitation of the Phoenix Contact CHARX SEC-3100 charging controller

Part 1: blog.ret2.io/2024/07/17/pwn…
Part 2: phoenixcontact.com/en-us/products…

Credits <a href="/ret2systems/">RET2 Systems</a>

#automotive #cybersecurity
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Useful guide on Linux page cache, memory management, mmap and cgroups biriukov.dev/docs/page-cach… Credits Viacheslav Biriukov #Linux #cybsersecurity

Useful guide on Linux page cache, memory management, mmap and cgroups

biriukov.dev/docs/page-cach…

Credits <a href="/brk0v/">Viacheslav Biriukov</a>

#Linux #cybsersecurity
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Beginners intro to x64 Linux Binary Exploitation (Dimitrios 🪼🪼 🇺🇦) Basic: valsamaras.medium.com/introduction-t… Return into lib: valsamaras.medium.com/introduction-t… RoP Chains: valsamaras.medium.com/introduction-t… Stack Canaries: valsamaras.medium.com/introduction-t… ASLR: valsamaras.medium.com/introduction-t… #exploit #infosec

Beginners intro to x64 Linux Binary Exploitation (<a href="/Ch0pin/">Dimitrios 🪼🪼 🇺🇦</a>)

Basic: valsamaras.medium.com/introduction-t…
Return into lib: valsamaras.medium.com/introduction-t…
RoP Chains: valsamaras.medium.com/introduction-t…
Stack Canaries: valsamaras.medium.com/introduction-t…
ASLR: valsamaras.medium.com/introduction-t… 

#exploit #infosec
0xor0ne (@0xor0ne) 's Twitter Profile Photo

A couple of interesting blog posts on hiding Linux processes dfir.ch/posts/slash-pr… righteousit.com/2024/07/24/hid… Credits Stephan Berger and Hal Pomeranz #Linux #Cybersecurity

A couple of interesting blog posts on hiding Linux processes

dfir.ch/posts/slash-pr…
righteousit.com/2024/07/24/hid…

Credits Stephan Berger and Hal Pomeranz

#Linux #Cybersecurity