Arget (@arget1313) 's Twitter Profile
Arget

@arget1313

Telecomm. Eng. Low level stuff, pwn, C programmer and Linux internals. When you get to heaven, look me up, I won't be there, but my code will!

ID: 1441510194270244865

linkhttp://github.com/arget13 calendar_today24-09-2021 21:10:13

110 Tweet

224 Followers

213 Following

Arget (@arget1313) 's Twitter Profile Photo

You all thinking that AAAAAA is just some random padding we use in pwn to reach the place we want, while actually it is expressing the most profound sentiment that is required to be a pwner

Arget (@arget1313) 's Twitter Profile Photo

5AM, tras haber pasado todas las fases del duelo a lo largo de 10h seguidas, descubriendo que debo modificar cada vez más y más partes más y más íntimas y delicadas del código, por fin consigo hacer un commit con algo funcional

5AM, tras haber pasado todas las fases del duelo a lo largo de 10h seguidas, descubriendo que debo modificar cada vez más y más partes más y más íntimas y delicadas del código, por fin consigo hacer un commit con algo funcional
HackTricks (@hacktricks_live) 's Twitter Profile Photo

I'll be giving a talk with Arget at #defcon tomorrow Sunday at 1pm in track 4 about abusing Linux memory to bypass file system based protections and distroless envs. The technique can also be used to execute anything in a very stealth way. Don't miss it if you are around!

HackTricks (@hacktricks_live) 's Twitter Profile Photo

Find a summary of the talk Arget and Carlos gave at DEFCON in book.hacktricks.xyz/linux-hardenin… and slides in docs.google.com/presentation/d… Talk title: Exploring Linux Memory Manipulation for Stealth and Evasion Enjoy!

HackTricks (@hacktricks_live) 's Twitter Profile Photo

Awesome talk of Arget  at HackTricks Track in /RootedCON  2023 about stealthiness in Linux titled: Stealth intrusions with DDexec-ng & in-memory dlopen() Don't miss it: youtube.com/watch?v=VM_gjj… #hacktricks

John Hammond (@_johnhammond) 's Twitter Profile Photo

Got to hang with HackTricks and Arget to hear all about their DEFCON presentation & latest research -- "ddexec", tooling to run shellcode and binaries in memory and bypass read-only filesystem protections or distroless environments 😱 SUPER COOL youtu.be/7dc29U9DeIE

Got to hang with <a href="/hacktricks_live/">HackTricks</a> and <a href="/arget1313/">Arget</a> to hear all about their DEFCON presentation &amp; latest research -- "ddexec", tooling to run shellcode and binaries in memory and bypass read-only filesystem protections or distroless environments 😱 SUPER COOL youtu.be/7dc29U9DeIE
goproslowyo (@goproslowyo) 's Twitter Profile Photo

Just watched a really great talk on, essentially, file-less in-memory code execution in read-only noexec partitions of distroless/rootless containers from HackTricks and Arget from their DEF CON 31 talk. Definitely give it a watch! youtu.be/poHirez8jk4

Adrian Mouat (@adrianmouat) 's Twitter Profile Photo

Back at DEFCON 31 there was a great talk from HackTricks and Arget on hacking distroless containers. I wrote up a blog explaining what the attack is and what it means for users of distroless containers. chainguard.dev/unchained/unde… youtu.be/poHirez8jk4?si…

Back at DEFCON 31 there was a great talk from <a href="/hacktricks_live/">HackTricks</a> and <a href="/arget1313/">Arget</a>  on hacking distroless containers. I wrote up a blog explaining what the attack is and what it means for users of distroless containers.

chainguard.dev/unchained/unde… 

youtu.be/poHirez8jk4?si…
simo (@_simo36) 's Twitter Profile Photo

I've audited the Android kernel in late 2023, and reported 10+ kernel bugs to Google, along with 2 exploits. Today, I'm releasing the first exploit, targeting the Mali GPU on Pixel devices, accessible from an untrusted_app context. github.com/0x36/Pixel_GPU…

Rebane (@rebane2001) 's Twitter Profile Photo

just finished a new blogpost on how i exploited the V8 javascript engine at a CTF! it's a beginner friendly journey from a memory corruption to a browser pwn, and features lots of cool CSS to help you understand various concepts along the way. have fun!! lyra.horse/blog/2024/05/e…

EuskalHack (@euskalhack) 's Twitter Profile Photo

No te puedes perder a nuestro siguiente ponente Yago Gutiérrez y su charla "Grabación de llamadas en Android: Una perspectiva ofensiva" en la próxima EuskalHack Security Congress VIII Arget #ESCVIII securitycongress.euskalhack.org/index_es.html#…

EuskalHack (@euskalhack) 's Twitter Profile Photo

Comenzamos con la charla "Grabación de llamadas en Android: Una perspectiva ofensiva" con Yago Gutiérrez, donde entenderemos el funcionamiento del sistema de audio en Android #MobileEnv #Malware #Reversing #ESCVIII Arget

Comenzamos con la charla "Grabación de llamadas en Android: Una perspectiva ofensiva" con Yago Gutiérrez, donde entenderemos el funcionamiento del sistema de audio en Android #MobileEnv #Malware #Reversing #ESCVIII <a href="/arget1313/">Arget</a>