dinosaurlover38 (@_dinolover38) 's Twitter Profile
dinosaurlover38

@_dinolover38

0-day monkey | IBM X-Force Offensive Research (XOR)

ID: 1924561196503728133

calendar_today19-05-2025 20:22:59

8 Tweet

205 Followers

67 Following

dinosaurlover38 (@_dinolover38) 's Twitter Profile Photo

Just got an LPE exploit for a 0-day bug I found working on the mitigation-v4 Linux kernel first try :D shoutout chompie who's cooking up the container escape šŸ‘€

Natalie Silvanovich (@natashenka) 's Twitter Profile Photo

While most vendors ship timely patches for vulnerabilities reported by Project Zero, they don’t always reach users. Today, we’re announcing Reporting Transparency, a new policy to encourage downstream fixes googleprojectzero.blogspot.com/2025/07/report…

chompie (@chompie1337) 's Twitter Profile Photo

I’m honored to be joining some amazing women in cybersecurity at the #BHUSA panel ā€œHacking the Status Quoā€. We’ll be sharing the journey of our careers: how we got started and what’s shaped us. Bring your questions and leave with fresh perspective 😊 blackhat.com/us-25/briefing…

chompie (@chompie1337) 's Twitter Profile Photo

Hosting a Windows kernel chal is hard! The box has been slammed so bad someone needs to go into the office to fix it 😭. And yet, still no one has the flag. I guess Infinite Loop Solution Inc.’s driver is totally secure šŸ˜. The backup is online! gogogo

Hosting a Windows kernel chal is hard! The box has been slammed so bad someone needs to go into the office to fix it 😭. And yet, still no one has the flag. I guess Infinite Loop Solution Inc.’s driver is totally secure šŸ˜.  The backup is online! gogogo
dinosaurlover38 (@_dinolover38) 's Twitter Profile Photo

CVE-2025-23282 is going to debut tomorrow at Hexacon in our talk "CUDA de Grâce" w/ chompie, but you can try CVE-2025-23332 now! Tweetable Python PoC: ``` import fcntl fcntl.ioctl(open('/dev/nvidiactl'),218,0) ```

bohops (@bohops) 's Twitter Profile Photo

Last month, Dylan Tran and I gave a talk Munich Cyber Tactics, Techniques and Procedures called "COM to the Darkside" focusing on COM/DCOM cross-session and fileless lateral movement tradecraft. Check out the slides here: github.com/bohops/COM-to-… Recording should be released soon.

dinosaurlover38 (@_dinolover38) 's Twitter Profile Photo

You can also use this same idea to defeat CONFIG_SLAB_VIRTUAL, even if a kernel PTE has been assigned; the memory still has another VMA from the fixed phys/virt relationship We did this in our exploit for CVE-2025-23282 (public soonšŸ¤ž)