Zy (@var10ck) 's Twitter Profile
Zy

@var10ck

ID: 1242833062401982466

calendar_today25-03-2020 15:18:00

54 Tweet

310 Followers

297 Following

Maor Shwartz (@malltos92) 's Twitter Profile Photo

The boom, the bust and the adjust The offensive cybersecurity industry — trends and updates I'm super excited to publish this article which embeds my experience in the offensive cybersecurity industry over the years. I hope you will enjoy it. medium.com/@maor_s/the-bo…

hardwear.io (@hardwear_io) 's Twitter Profile Photo

🎮PS5 enthusiasts! Specter's talk is here! ⚡Specter Specter presented the evolving attack surface, modern mitigations like Supervisor Mode Access Prevention (SMAP) etc + internal workings of the PS5's hypervisor ▶️youtu.be/HBFDjfmIUis #hw_ioUSA2023 #gamingconsole

Foundry Zero (@foundryzero) 's Twitter Profile Photo

For too long has it been a mild inconvenience to not have the features of GEF in LLDB. We at Foundry Zero feel you deserve better! So we ported GEF features to LLDB. You're welcome. Read about it here: foundryzero.co.uk/2023/07/13/lle… Find it here: github.com/foundryzero/ll…

nicolas vamous (@nvamous) 's Twitter Profile Photo

A simple fuzzer I wrote 2 years ago: "Bug Swatter: A lightweight convenient blackbox fuzzer to make life easier". yanglingxi1993.github.io/bug_swatter/bu… Simple but worked!

RET2 Systems (@ret2systems) 's Twitter Profile Photo

Hello.. is this thing still on? It's 2023, so here's a fun new blogpost on how we used Intel's x86 CPU JTAG to dump the infamous "secret bootrom" in Microsoft's original Xbox: blog.ret2.io/2023/08/09/jta…

Hello.. is this thing still on? 

It's 2023, so here's a fun new blogpost on how we used Intel's x86 CPU JTAG to dump the infamous "secret bootrom" in Microsoft's original Xbox: blog.ret2.io/2023/08/09/jta…
nicolas vamous (@nvamous) 's Twitter Profile Photo

Finally finish the talk "Game of Cross Cache: Let's Win It in a More Effective Way!", trying to solve challenges in cross-cache attack. Here are slides: github.com/yanglingxi1993…

Maxime Rossi Bellom (@max_r_b) 's Twitter Profile Photo

Better late than never! The slides of our talk "Attacking Samsung Galaxy A* Boot Chain" at offensivecon can be found here: github.com/quarkslab/conf… The video is also available: youtube.com/watch?v=WJ7wkJ…

exploits.club (@exploitsclub) 's Twitter Profile Photo

It's a great week for a vuln research newsletter 📰 🏴‍☠️ "Inside The 0-day Market" slides from mdowd NCC Group Research & Technology with some musl heap magic .NET RE fun from SinSinology and Horizon3 Attack Team MIPs ROP from + jobs and more 👇 blog.exploits.club/exploits-club-…

Ivan Fratric 💙💛 (@ifsecure) 's Twitter Profile Photo

New Project Zero blog post by Sergei Glazunov and Mark Brand: Project Naptime: Evaluating Offensive Security Capabilities of Large Language Models googleprojectzero.blogspot.com/2024/06/projec…

Andrej Karpathy (@karpathy) 's Twitter Profile Photo

These 94 lines of code are everything that is needed to train a neural network. Everything else is just efficiency. This is my earlier project Micrograd. It implements a scalar-valued auto-grad engine. You start with some numbers at the leafs (usually the input data and the

These 94 lines of code are everything that is needed to train a neural network. Everything else is just efficiency.

This is my earlier project Micrograd. It implements a scalar-valued auto-grad engine. You start with some numbers at the leafs (usually the input data and the
Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

Neat research from E.V.A Information Security Consulting, highlighting (yet again), the increased risk of supply chain attacks introduced by dependency managers 😱 evasec.io/blog/eva-disco…

Linux Kernel Security (@linkersec) 's Twitter Profile Photo

SSD Advisory — Linux kernel TAPRIO OOB An article about exploiting an RCU-involved race condition in the TAPRIO network queuing discipline implementation. The exploit is by kylebot. ssd-disclosure.com/ssd-advisory-l…

SSD Advisory — Linux kernel TAPRIO OOB

An article about exploiting an RCU-involved race condition in the TAPRIO network queuing discipline implementation. The exploit is by <a href="/ky1ebot/">kylebot</a>.

ssd-disclosure.com/ssd-advisory-l…
Project Zero Bugs (@projectzerobugs) 's Twitter Profile Photo

From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code googleprojectzero.blogspot.com/2024/10/from-n…

deepsec.cc (@deepsec_cc) 's Twitter Profile Photo

#deepsec 12/16/ 2025 "Attacking Apple Display Co-processor" by Ye Zhang maps Apple’s DCP attack surface, shows firmware analysis and fuzzing that led to 14 CVEs and code execution on the display coprocessor, and reviews Apple’s fixes and new mitigations. deepsec.cc