h4x (@c0ner0ne) 's Twitter Profile
h4x

@c0ner0ne

Guy from the late 70’s - former software cracker at CORE - nowadays fighting malware and still interested in breaking things

ID: 3065725185

linkhttp://r3v3rs3r.com calendar_today01-03-2015 18:37:04

6,6K Tweet

367 Takipçi

457 Takip Edilen

Adrián Díaz (@s4dbrd) 's Twitter Profile Photo

New post: deep dive into BEDaisy.sys, BattlEye’s kernel anti-cheat driver used in PUBG, R6 Siege, Escape from Tarkov, and more. WinDbg output + annotated IDA pseudocode included. s4dbrd.github.io/posts/reversin… #ReverseEngineering #WindowsInternals #AntiCheat

@Cravaterouge.bsky.social (@rouge_cravate) 's Twitter Profile Photo

I’ve just published a new technical analysis exploring CVE-2026-20820, a buffer overflow in the CLFS driver. cravaterouge.com/articles/cve-2…

spaceraccoon | Eugene Lim (@spaceraccoonsec) 's Twitter Profile Photo

I found a remote code execution on the latest TP-Link Tapo webcam models! The path to code execution wasn't direct and involved an interesting chain (3 CVEs). Check out my blogpost for more details! spaceraccoon.dev/getting-shell-…

Richard Johnson (@richinseattle) 's Twitter Profile Photo

Spread the word! Phrack Zine CFP with demoscene cracktro is live. Turn up the volume and enjoy the awesome stylings of Piotr Bania with some hopefully inspiring text from phrack staff :) phrack.org

Spread the word! <a href="/phrack/">Phrack Zine</a> CFP with demoscene cracktro is live. Turn up the volume and enjoy the awesome stylings of <a href="/PiotrBania/">Piotr Bania</a> with some hopefully inspiring text from phrack staff :)
phrack.org
Jiří Vinopal (@vinopaljiri) 's Twitter Profile Photo

#IDA Pro tip 🤙 ApplyCalleeTypeEx — ApplyCalleeType is Reborn 🔥 — — — IMO one of the most practically useful IDA plugins ever written. It died on IDA 9.x. Not anymore. Rebuilt from scratch — compatible IDA 8.x → 9.3+. github.com/Dump-GUY/Apply… — — — What's new: ✅ IDA 9.3 ready +

YungBinary (@yungbinary) 's Twitter Profile Photo

New blog! We found an open directory attributed to #MuddyWater Iranian APT and found vulnerabilities/victims they've been targeting, red-team tools, and a loader that deploys a persistent variant of #Tsundere botnet - a MaaS sold by a Russian threat actor that is known for using

New blog! We found an open directory attributed to #MuddyWater Iranian APT and found vulnerabilities/victims they've been targeting, red-team tools, and a loader that deploys a persistent variant of #Tsundere botnet - a MaaS sold by a Russian threat actor that is known for using
fail0verflow (@fail0verflow) 's Twitter Profile Photo

Method we used (>5 years ago, now) on ps5 to fiddle with mp4 and hv memory: github.com/fail0verflow/p… hope it helps for linux!

hypr (find me on bluesky) (@hyprdude) 's Twitter Profile Photo

just messing around now: > OOB read from msg_msg corruption to leak a struct file (easier on configs w/o dedicated filp cache) > leak struct cred pointer from the file object > OOB write > corrupt freelist with struct cred addr + spray to reclaim (no FREELIST_HARDEN)

just messing around now:

&gt; OOB read from msg_msg corruption to leak a struct file (easier on configs w/o dedicated filp cache)
&gt; leak struct cred pointer from the file object
&gt; OOB write &gt; corrupt freelist with struct cred addr + spray to reclaim (no FREELIST_HARDEN)
Justin Elze (@hackinglz) 's Twitter Profile Photo

For those of you playing around at home with the LiteLLM supply chain stuff. Here are the decoded payloads and other info. github.com/HackingLZ/lite…

timschuerewegen (@timschuerewegen) 's Twitter Profile Photo

The Nintendo Talking Flower firmware does not check the size of the language index table when loading it from SPI flash into RAM, allowing me to corrupt the stack, execute arbitrary code, and dump the protected STM32 firmware🤣 (SHA1 51ec2ee3bbc12772cd4abed1bf2d26b02e541e14)

The Nintendo Talking Flower firmware does not check the size of the language index table when loading it from SPI flash into RAM, allowing me to corrupt the stack, execute arbitrary code, and dump the protected STM32 firmware🤣
(SHA1 51ec2ee3bbc12772cd4abed1bf2d26b02e541e14)
Moritz (@m_r_tz) 's Twitter Profile Photo

The FLARE team now freely distributes its quality reverse engineering and malware analysis educational content at github.com/mandiant/flare…. Launched with: - Malware Analysis Crash Course - Go Reversing Reference - Intro to TTD

hypr (find me on bluesky) (@hyprdude) 's Twitter Profile Photo

New post is up! This one uses CVE-2025-20741 (a heap overflow in the MediaTek MT76xx driver) to show how a bit of kernel alchemy can turn a heap OOB write into a number of stronger exploit primitives, up to page-level r/w via pipe_buffer corruption :) blog.coffinsec.com/0day/2026/04/0…

Marc R (@seifreed) 's Twitter Profile Photo

Updated my #bindiff fork to support building against IDA Pro 9.3 / IDA SDK 9.x, including Qt6-era plugin fixes Google github.com/seifreed/bindi…

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

📢 The FLARE team has launched the FLARE Learning Hub - a free resource to hone your malware analysis and reverse engineering skills! 🛠️ github.com/mandiant/flare… The initial launch brings with it: - An in-depth introduction to time-travel debugging (TTD) - A comprehensive Go

RAZOR 1911 (@razor) 's Twitter Profile Photo

We went to Revision 2026 and released a eponymous demo celebrating 40 years of Razor 1911 activity in the scene. It does get a little bit emotional. pouet.net/prod.php?which…

MR GUSTAVO😼 (@k1rallik) 's Twitter Profile Photo

🚨 do you understand what just happened to your passwords cpuid one of the most trusted sites in PC hardware. hacked. April 10th, 2026. CPU-Z and HWMonitor. both compromised. > fake CRYPTBASE.dll ships inside the installer > connects to C2, downloads a C# file > compiles it

RAZOR 1911 (@razor) 's Twitter Profile Photo

youtube.com/watch?v=wKiHwa… Timelapse of exocets logo for our 40 year demo. He managed to nail both his own style and the classic French razor 1911 line of 90s logos by guys like zebig and x-rage. The groups history was the theme of the demo and he completed that mission 11/10.