Ngo Wei Lin
@creastery
www = web web web · Staff Security Engineer @praetorianlabs · Previously 🌐 Security Researcher @starlabs_sg · Plays CTFs with HATS SG. Opinions are my own.
ID: 569200568
https://www.creastery.com 02-05-2012 15:45:13
114 Tweet
1,1K Takipçi
523 Takip Edilen
Special thanks to @chudypb, Rocco Calvi, itsmehi, Ngo Wei Lin, starlabs, Claroty & #team82, and Trend Zero Day Initiative for finding & responsibly disclosing security vulnerabilities in Ignition. Fixes & full credits: bit.ly/4aytnlq
Off-by-One 2024 Conference CFP is now opened! Be part of a historical event and shape the future of offensive security in this region. Submission and speaker benefits offbyone.sg/cfp/ If you like to talk to us, drop us a line at [email protected]
Route to Safety: Navigating Router Pitfalls is the swansong from Daniel Lim starlabs.sg/blog/2024/rout… We hope everyone enjoyed his informative post and wish him all the best in his future endeavours.
Send()-ing Myself Belated Christmas Gifts - GitHub's Environment Variables & GHES Shell starlabs.sg/blog/2024/04-s… Read about how one of our talented researchers, Ngo Wei Lin , found it, exploited it and reported it in a fast and professional manner:
Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! blog.orange.tw/2024/08/confus… Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code
I just published a new blog post sharing an improved Deserialization Gadget Chain for Ruby! It builds on the work of others, including Leonardo Giovanni, Peter Stöckli GitHub Security Lab and William Bowling @[email protected] nastystereo.com/security/ruby-…
Happy to announce that I'll be speaking alongside Dennis Pacewicz at RubyKaigi next week! We'll be sharing some secret stories on how I gained access to production GitHub credentials using CVE-2024-0200 as well as GitHub Security's remediation efforts. rubykaigi.org/2025/presentat…