
Chaitanya
@ant4g0nist
Founder @yokai_network || Vulnerability Research || fuzzing artist || 🦀 + security
ID: 452083374
https://fuzzing.science 01-01-2012 11:46:18
2,2K Tweet
1,1K Followers
255 Following




beautiful and incredibly interesting talk on reverse engineering the OG xbox by RET2 Systems's Markus, incl. building a custom interposer to upgrade the CPU a deep dive into hardware hacking, an ode to hw engineering and a call for software-focused researchers to try new things








sudi @[email protected] j j only problem is i didn’t know shit about the V8 sandbox, so had to spend a few days wrapping my head around it. then found a bunch of n-day sandbox bypasses, but the “V8 Sandbox escape via regexp” one is just beautiful, needs a sweet little ROP chain: issues.chromium.org/issues/3304048…






