EranShimony (@eranshimony) 's Twitter Profile
EranShimony

@eranshimony

Security researcher, malware analyst, low level lover and not too bad Starcraft 2 player
My tweets and opinions are my own

ID: 1108063836257611777

calendar_today19-03-2019 17:53:00

186 Tweet

729 Followers

129 Following

EranShimony (@eranshimony) 's Twitter Profile Photo

This is a blog on how to write security-related blogs. Please take a look, and let's make the world easier to understand. medium.com/@eranhelforc/b…

CyberArk Labs (@cyberarklabs) 's Twitter Profile Photo

.Shak Reiner 🍍 walks us through what exactly is Distributed Identity and how identity works on the #blockchain. #DID allows everyone to own & control their digital identity. It also exposes new attack surfaces and potentially vulnerable to old ones. spr.ly/6015M0Dw9

NULLCON (@nullcon) 's Twitter Profile Photo

⌨️Colorful 🔴🔵🟢#vulnerabilities on your keyboard! 💡Tal Tal Lossos & Eran EranShimony will share their analysis & investigation of Razer's #Linux #kernel module, followed by finding several 0-day bugs with live demo 💻Find out more ➡️bit.ly/3Gy1Ofg #NullconDE2023

⌨️Colorful 🔴🔵🟢#vulnerabilities on your keyboard!

💡Tal <a href="/TalLossos/">Tal Lossos</a> &amp; Eran <a href="/EranShimony/">EranShimony</a> will share their analysis &amp; investigation of Razer's #Linux #kernel module, followed by finding several 0-day bugs with live demo

💻Find out more ➡️bit.ly/3Gy1Ofg

#NullconDE2023
Omer Tsarfati (@omertsarfati) 's Twitter Profile Photo

Finding one vulnerable kernel driver is cool, but finding multiple vulnerable drivers it’s even better! I’m excited to share my blog post about an interesting vulnerable driver code base that many different vendors tend to share. cyberark.com/resources/thre…

Alon Zahavi (@alon_z4) 's Twitter Profile Photo

👍Check out my new blog post about a bug in the not-so-well maintained NTFS3 driver in the Linux Kernel 👍 cyberark.com/resources/thre…

EranShimony (@eranshimony) 's Twitter Profile Photo

Run in python "for role in openai.Model.list()['data']: print(role['id'])" There is a huge discrepancy between what OpenAI claim what their models do, and what is actually usable. At least, 60% are not working, and there is no documentation whatsoever, comon you are not Microsoft

Hen Mazzig (@henmazzig) 's Twitter Profile Photo

Noya is a 12-year-old Israeli girl with autism, she was the biggest Harry Potter fan, she loved dreaming away about a world where magic can fix anything that is broken in our world. Hamas kidnapped her a week ago and no amount of dreaming can bring her back to her parents. But

Noya is a 12-year-old Israeli girl with autism, she was the biggest Harry Potter fan, she loved dreaming away about a world where magic can fix anything that is broken in our world. 

Hamas kidnapped her a week ago and no amount of dreaming can bring her back to her parents.

But
EranShimony (@eranshimony) 's Twitter Profile Photo

This is a great blog, showcasing how to add a subsystem to Syzkaller, and exploring several memory corruption bugs in the NVMe driver in the Linux Kernel.

EranShimony (@eranshimony) 's Twitter Profile Photo

Breaking LLM Guardrails - Advanced Jailbreaking Techniques Join Shai Dvash and me for a hands-on dive into: Bypassing LLM defenses with prompt engineering Real CTF challenges to test your skills in jail-breaking LLMs intentsummit.org

EranShimony (@eranshimony) 's Twitter Profile Photo

My buddies and I have developed an open-source fuzzer that is fully operational and fully extendable. So far, we’ve successfully jailbroken every tested LLM. Plus - The logo is a Terminator riding a fuzzy sheep. github.com/cyberark/Fuzzy…