Crowdfense (@crowdfense) 's Twitter Profile
Crowdfense

@crowdfense

Crowdfense is the world-leading research hub and acquisition platform for zero-day exploits and vulnerability research. We offer the highest bounties

ID: 970567709577662465

linkhttps://www.crowdfense.com/ calendar_today05-03-2018 07:52:29

244 Tweet

2,2K Followers

1,1K Following

Crowdfense (@crowdfense) 's Twitter Profile Photo

The following vulnerability has been added to our n-day feed: - CVE-2025-21333: Microsoft Windows Hyper-V NT Kernel Integration VSP Driver (vkrnlintvsp.sys) Heap-based Buffer Overflow LPE crowdfense.com/n-day-feed-upd… youtu.be/gp063maOPp4

Offensive X (@theoffensivex) 's Twitter Profile Photo

The OffensiveX 2025 Agenda Is Live. On June 18–19, we’re bringing the sharpest minds in offensive security to Athens to drop real research, real tools, and real tactics. You’ve seen who’s speaking. Now it’s time to see what they’re dropping. 🔗 Check the full agenda:

The OffensiveX 2025 Agenda Is Live.

On June 18–19, we’re bringing the sharpest minds in offensive security to Athens to drop real research, real tools, and real tactics.

You’ve seen who’s speaking. Now it’s time to see what they’re dropping.

🔗 Check the full agenda:
Crowdfense (@crowdfense) 's Twitter Profile Photo

The following vulnerabilities have been added to our feed: - UNDISCLOSED: Flexense Computing System SyncBreeze RCE - CVE-2025-29824: Windows Common Log File System driver UAF DoS - CVE-2025-21375: Windows Kernel Streaming Driver Buffer Overflow DoS crowdfense.com/n-day-feed/

Crowdfense (@crowdfense) 's Twitter Profile Photo

Crowdfense is ready for Offensive X in Athens! Meet us at our stand to talk 0-days, research and offensive security. Let’s connect offensivex.org, follow the bugs 🪲🐞🐜🪳🕷️🐛

Crowdfense (@crowdfense) 's Twitter Profile Photo

Crowdfense is at Offensive X conference, a perfect moment to highlight our N-Day Feed: weaponized, non-public vulnerabilities for Red & Blue Teams. 🟥: Mimic real APTs 🟦: Build custom detections on real-world exploits crowdfense.com/n-day-feed/

Offensive X (@theoffensivex) 's Twitter Profile Photo

Offensive X 2025 is proud to have Crowdfense as a Gold Sponsor on our side. CrowdFense operates at the cutting edge of vulnerability research and acquisition, enabling top researchers to contribute to global security.  #OffensiveX2025 #OffensiveX #Cybersecurity

Offensive X 2025 is proud to have <a href="/crowdfense/">Crowdfense</a> as a Gold Sponsor on our side.

CrowdFense operates at the cutting edge of vulnerability research and acquisition, enabling top researchers to contribute to global security. 

#OffensiveX2025 #OffensiveX #Cybersecurity
Crowdfense (@crowdfense) 's Twitter Profile Photo

The following vulnerabilities have been added to our feed: - CVE-2025-32756: multiple Fortinet products Buffer Overflow RCE - CVE-2025-47955: Windows RasMan LPE - CVE-2025-1758: Kemp LoadMaster Stack Overflow DoS crowdfense.com/n-day-feed/ youtu.be/CuY38zt5YKo?si…

Crowdfense (@crowdfense) 's Twitter Profile Photo

It's going to be a hot summer. 🔥 We’ve got two blog posts in the pipeline, one with a great primitive we’re excited to drop. Just waiting on MSRC approval + CVE assignment before publishing. Stay tuned...

POC_Crew 👨‍👩‍👦‍👦 (@poc_crew) 's Twitter Profile Photo

[#POC2025] Registration is NOW OPEN! Early Bird: Sept 1 – Sept 30 Standard: Oct 1 – Oct 30 CFP is still OPEN — We’re already seeing 🔥 talks coming in Got something bold, brilliant, or badass? Submit yours before → Sept 30 📢1st Speaker Line-up drops this week🙏 🌐

Crowdfense (@crowdfense) 's Twitter Profile Photo

Technical deep-dive into CVE-2025-53149, a heap-based buffer overflow in the Windows Kernel Streaming WOW Thunk Service driver (ksthunk.sys). crowdfense.com/cve-2025-53149…

Crowdfense (@crowdfense) 's Twitter Profile Photo

Thanks to everyone who engaged with our latest blog post; we’re blown away by its reception! This Thursday, we’ll be diving into a CVE that burned a particularly interesting primitive. 👀

Crowdfense (@crowdfense) 's Twitter Profile Photo

We’ve seen a bunch of new faces lately. Welcome! 👋 If you want real-time updates and stay in the loop, make sure you're following our Telegram channel and you are registered to our VRH platform: t.me/crowdfense vrh.crowdfense.com

Crowdfense (@crowdfense) 's Twitter Profile Photo

We just released a new batch of mobile and other high-value vulnerability bounties on our VRH platform. Targets include iOS, Android, and more. Now's the time to jump in! Register or log in to VRH and explore the opportunities: vrh.crowdfense.com

Crowdfense (@crowdfense) 's Twitter Profile Photo

The following vulnerabilities have been added to our feed: - CVE-2025-33053: Microsoft Windows Internet Shortcut Files RCE - CVE-2025-25257: Fortinet FortiWeb RCE - CVE-2025-50154: Microsoft Windows File Explorer NTLM Leak crowdfense.com/n-day-feed/

Gynvael Coldwind (@gynvael.bsky.social) (@gynvael) 's Twitter Profile Photo

pagedout.institute ← Call for articles & art for issue #8 of this technical IT zine is open! As usual, we accept 1-page articles about everything interesting in IT and related fields (be it programming, cybersec, AI, demoscene, retro, electronics, etc).