Sakib SarkaršŸž (@0xroi_) 's Twitter Profile
Sakib SarkaršŸž

@0xroi_

Vulnerability Researcher | Part-time Bug Bounty Hunter | @0Bugltd && @meghnacloud

ID: 1500341031937929216

linkhttps://www.0xroi.cf calendar_today06-03-2022 05:22:51

196 Tweet

35 Followers

389 Following

Theori (@theori_io) 's Twitter Profile Photo

Do you use a virtual machine to browse dangerous links safely? If you use the Chrome browser inside that virtual machine, is it secure enough? As you might have guessed, the answer is not so much. We chained six unique CVEs from 2023 listed below. • Chrome Renderer RCE :

Roy Carrilho (@ruicarrilho5) 's Twitter Profile Photo

Found the little book about OS development! This book walks you through the process of making your own OS, all in C! You can learn a lot of both the language and OS's from this. Enjoy!

Found the little book about OS development! This book walks you through the process of making your own OS, all in C! You can learn a lot of both the language and OS's from this. Enjoy!
zhero; (@zhero___) 's Twitter Profile Photo

the research paper is out: Next.js and the corrupt middleware: the authorizing artifact result of a collaboration with inzo that led to CVE-2025-29927 (9.1-critical) zhero-web-sec.github.io/research-and-t… enjoy the read!

the research paper is out:

Next.js and the corrupt middleware: the authorizing artifact

result of a collaboration with <a href="/inzo____/">inzo</a> that led to CVE-2025-29927 (9.1-critical)

zhero-web-sec.github.io/research-and-t…

enjoy the read!
ā€ŒRenwa (@renwax23) 's Twitter Profile Photo

Another month, another writing RCE vulnerability inside Opera browser by using a stored self-XSS on MyFlow (this is different from the previous rce which I published back in 2021) medium.com/@renwa/stored-…

BSidesCanberra (@bsidescbr) 's Twitter Profile Photo

The BSides Canberra 2024 keynote is now available to watch! "The Exploit Development Life Cycle: From Concept to Compromise" – chompie breaks down the art of exploit dev, from that first spark to full pwnage. Missed it live? Watch it now: youtu.be/ce0bXORSMX4

tuo4n8 (@tuo4n8) 's Twitter Profile Photo

After many bypass attempts and creating several gadgets for RCE on Apple, and after a looooooooong wait… we finally got it! Khoa Dinh #BugBounty

After many bypass attempts and creating several gadgets for RCE on <a href="/Apple/">Apple</a>, and after a looooooooong wait… we finally got it! <a href="/_l0gg/">Khoa Dinh</a> 
#BugBounty
Sean Heelan (@seanhn) 's Twitter Profile Photo

I got back into bug hunting recently for the first time in a looooooong time. Bug 1 from week 1 was a pre-auth remote UAF in the Linux kernel's SMB implementation github.com/torvalds/linux…

hackyboiz (@hackyboiz) 's Twitter Profile Photo

[Research] Bypassing Windows Kernel Mitigations: Part0 - Deep Dive into KASLR Leaks Restriction hackyboiz.github.io/2025/04/13/l0c… In this post, we’ll take a closer look at the new KASLR-related mitigation introduced in Windows 11 and Windows Server 24H2, and explore a novel method for

[Research] Bypassing Windows Kernel Mitigations: Part0 - Deep Dive into KASLR Leaks Restriction

hackyboiz.github.io/2025/04/13/l0c…

In this post, we’ll take a closer look at the new KASLR-related mitigation introduced in Windows 11 and Windows Server 24H2, and explore a novel method for
MatheuZ (@matheuzsecurity) 's Twitter Profile Photo

Article: matheuzsecurity.github.io/hacking/gcc/ Github: github.com/MatheuZSecurit… ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code. #malware #gcc #ldpreload #linux

Article: matheuzsecurity.github.io/hacking/gcc/
Github: github.com/MatheuZSecurit…

ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.

#malware #gcc #ldpreload #linux
Crusaders of Rust (@cor_ctf) 's Twitter Profile Photo

We are backšŸ˜Ž Say hello to our kernelCTF submission for CVE-2025-37752🩸 Who would have thought you could pwn a kernel with just a 0x0000 written 262636 bytes out of bounds? Read the full writeup at: syst3mfailure.io/two-bytes-of-m… šŸ‘€

Dillon Franke (@dillon_franke) 's Twitter Profile Photo

Thrilled to announce my new Project Zero blog post is LIVE! šŸŽ‰ I detail my knowledge-driven fuzzing process to find sandbox escape vulnerabilities in CoreAudio on MacOS. I'll talk about this and the exploitation process next week offensivecon! googleprojectzero.blogspot.com/2025/05/breaki…

chompie (@chompie1337) 's Twitter Profile Photo

Me and the homies are dropping browser exploits on the red team engagement šŸ˜Ž. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application. ibm.com/think/x-force/…