REhints (@rehints) 's Twitter Profile
REhints

@rehints

sharing reverse engineering knowledge

ID: 1410020438

linkhttps://github.com/rehints calendar_today07-05-2013 11:25:24

3,3K Tweet

13,13K Takipçi

5 Takip Edilen

b33f | 🇺🇦✊ (@fuzzysec) 's Twitter Profile Photo

I am releasing a reconstructed version of the cassowary CVE (CVE-2024-23222) that was disclosed as part of the Coruna leak. I also did some research with my AI assistants 😄 to reproduce a crash for the bug on x86_64 Linux github.com/FuzzySecurity/…

Ori Nimron (@orinimron123) 's Twitter Profile Photo

Just released DriverExplorer — a Rust utility for exploring Windows kernel drivers. • Enumerate loaded drivers • Easily Load / Unload drivers • Built for Windows kernel devs & security researchers: github.com/orinimron123/D…

Just released DriverExplorer — a Rust utility for exploring Windows kernel drivers.
• Enumerate loaded drivers
• Easily Load / Unload drivers 
• Built for Windows kernel devs & security researchers:
github.com/orinimron123/D…
nicolodev (@nicolodev) 's Twitter Profile Photo

The recording of my talk "Challenges in Decompilation and Reverse Engineering of CUDA-based Kernels" at RE//verse is now online! Recording: youtube.com/watch?v=ns5jFu… Slides: nicolo.dev/files/pdf/reve… Binary Ninja plugin: github.com/seekbytes/ptxN…

jeppojeps bsky social (@jeppojeps) 's Twitter Profile Photo

My talk at RE//verse is online, pure geek entertainment youtube.com/watch?v=UKGH_Y… Slides docs.google.com/presentation/d… CosmicHammer project - send us your bitflips github.com/fuzzsociety/Co… Please give it some RT love, this is the ultimate twist of rowhammer Halvar Flake Brendan Dolan-Gavitt

Alex Matrosov (@matrosov) 's Twitter Profile Photo

Dave Aitel Nice blog! This hits a real pain point with current SAST tooling. Most of it just runs a bunch of generic checks without understanding the actual threat model or where the real security boundaries are. That lack of semantic context is exactly the issue, I’ve been arguing for a

<a href="/daveaitel/">Dave Aitel</a> Nice blog! This hits a real pain point with current SAST tooling. Most of it just runs a bunch of generic checks without understanding the actual threat model or where the real security boundaries are. That lack of semantic context is exactly the issue, I’ve been arguing for a
OtterSec (@osec_io) 's Twitter Profile Photo

We achieved a guest-to-host escape by exploiting a QEMU 0-day where the bytes written out of bounds were uncontrolled. Full breakdown of the technique, glibc allocator behavior, and our heap spray/RIP-control primitive ↓

We achieved a guest-to-host escape by exploiting a QEMU 0-day where the bytes written out of bounds were uncontrolled.

Full breakdown of the technique, glibc allocator behavior, and our heap spray/RIP-control primitive ↓
Alex Plaskett (@alexjplaskett) 's Twitter Profile Photo

An analysis of CVE-2026-21236 - A heap based buffer overflow in the Microsoft Windows Kernel afd.sys - was just published by Emily L a recent secondment with my team EDG! Nice work for her first triage of a kernel memory corruption bug! nccgroup.com/research/vulne…

zeroxjf (@zeroxjf) 's Twitter Profile Photo

Reverse engineered Apple’s Background Security Improvement (BSI) update for iOS 26.3.1. Found potential WebKit SOP bypass it patches — NavigateEvent.canIntercept=true on cross-port navigations that should be non-interceptable. Impact: redirect hijack github.com/zeroxjf/WebKit…

RE//verse (@reverseconf) 's Twitter Profile Photo

The Xbox One was hacked for the first time in over a decade at RE//verse! Watch the full talk here: youtu.be/FTFn4UZsA5U?si…

The Xbox One was hacked for the first time in over a decade at RE//verse! Watch the full talk here: youtu.be/FTFn4UZsA5U?si…
Alex Matrosov (@matrosov) 's Twitter Profile Photo

Get insights into your software supply chain, now free and open source. SBOMs are a powerful type of report. If you generate them, make sure you’re collecting and monitoring them at scale.

ESET Research (@esetresearch) 's Twitter Profile Photo

#ESETresearch analyzed more than 80 EDR killers, seen across real-world intrusions, and used ESET telemetry to document how these tools operate, who uses them, and how they evolve beyond simple driver abuse. welivesecurity.com/en/eset-resear… 1/6

Jailbreakapps (@jailbreakaer) 's Twitter Profile Photo

CVE-2025-24257 — IOGPUFamily kernel heap OOB write on iOS 18.3 .. First public PoC — built entirely github.com/crazymind90/CV…

RE//verse (@reverseconf) 's Twitter Profile Photo

Catch Christopher Domas’ keynote from RE//verse 2026! fail: jmp fail (everything I got wrong in RE and security research) gets into the dead ends, bad ideas, and wasted hours behind real progress in RE and security work. Watch now: youtu.be/iOq8O_phwbA?si…

Catch Christopher Domas’ keynote from RE//verse 2026! fail: jmp fail (everything I got wrong in RE and security research) gets into the dead ends, bad ideas, and wasted hours behind real progress in RE and security work. Watch now: youtu.be/iOq8O_phwbA?si…