DEVCORE (@d3vc0r3) 's Twitter Profile
DEVCORE

@d3vc0r3

Cyber Red Team in Taiwan

ID: 2343289008

linkhttp://devco.re calendar_today14-02-2014 08:36:54

104 Tweet

3,3K Takipçi

0 Takip Edilen

DEVCORE (@d3vc0r3) 's Twitter Profile Photo

#POC2024 kicks off this week! 🚀 Catch Pumpkin (Pumpkin 🎃)’s debut talk on his breakthrough exploitation technique from #Pwn2OwnVancouver2024: "How I use a novel approach to exploit a limited OOB on Ubuntu at Pwn2Own Vancouver 2024". #VulnerabilityResearch #Ubuntu #CyberSecurity

DEVCORE (@d3vc0r3) 's Twitter Profile Photo

Angelboy (Angelboy) takes the CODE BLUE stage in Japan with his latest insights into Windows Kernel vulnerabilities. Don’t miss it! #MSRC #VulnerabilityResearch #codeblue_jp

DEVCORE (@d3vc0r3) 's Twitter Profile Photo

This month, Orange Tsai 🍊 and splitline 👁️🐈‍⬛ revealed a new attack surface at #BHEU, uncovering Windows's deepest Unicode Transformer with wide impacts on well-known applications and OSS projects. Explore the pre-release site while we prepare the full blog: worst.fit

This month, <a href="/orange_8361/">Orange Tsai  🍊</a> and <a href="/_splitline_/">splitline 👁️🐈‍⬛</a> revealed a new attack surface at #BHEU, uncovering Windows's deepest Unicode Transformer with wide impacts on well-known applications and OSS projects.

Explore the pre-release site while we prepare the full blog: worst.fit
DEVCORE (@d3vc0r3) 's Twitter Profile Photo

Congrats to NiNi on his debut at the 38th Chaos Communication Congress (CCC)! He’ll be presenting “From Convenience to Contagion: The Libarchive Vulnerabilities Lurking in Windows 11,” diving into several vulnerabilities in libarchive—including a RCE exploit.#38c3

Congrats to <a href="/terrynini38514/">NiNi</a> on his debut at the 38th Chaos Communication Congress (CCC)!

He’ll be presenting “From Convenience to Contagion: The Libarchive Vulnerabilities Lurking in Windows 11,” diving into several vulnerabilities in libarchive—including a RCE exploit.#38c3
DEVCORE (@d3vc0r3) 's Twitter Profile Photo

🤘Congrats Orange(Orange Tsai 🍊) and Splitline(splitline 👁️🐈‍⬛) on making it to 2024 Top 10 Web Hacking Techniques! Check out their groundbreaking research: portswigger.net/research/top-1…

DEVCORE (@d3vc0r3) 's Twitter Profile Photo

Our latest deep dive explores libarchive vulnerabilities under recent Windows 11 updates. 🔍🔓 Check out NiNi's (NiNi) technical write-up for key insights and security implications. Read more here: devco.re/blog/2025/02/1… #VulnerabilityResearch #Cybersecurity

DEVCORE (@d3vc0r3) 's Twitter Profile Photo

DEVCORE CONFERENCE 2025 wrapped, from red team assessment roots to now featuring satellite security, PhaaS, cloud security, exploit hunting and more. Huge thanks to our guest speakers Echo, John, Ashley, GD, and Vic Huang for sharing their cutting-edge research! #cybersecurity

DEVCORE CONFERENCE 2025 wrapped, from red team assessment roots to now featuring satellite security, PhaaS, cloud security, exploit hunting and more.

Huge thanks to our guest speakers Echo, John, Ashley, GD, and Vic Huang for sharing their cutting-edge research!

#cybersecurity
DEVCORE (@d3vc0r3) 's Twitter Profile Photo

Based on last year’s talk at #DEVCORECONFERENCE, our Red Team expert XY breaks it all down in a new blog. over 50% of organizations still have risky AD CS setups—and yes, full domain takeover is still happening. Read more: devco.re/blog/2025/04/1… #CyberSecurity #RedTeam #ADCS

DEVCORE (@d3vc0r3) 's Twitter Profile Photo

Big congrats to NiNi on earning Taiwan’s First OffSec OSEE Certification 🙌 After completing Taiwan’s first OffSec Live Training EXP-401 in August last year, NiNi from our research team has officially passed the OSEE exam! #OffSec

DEVCORE (@d3vc0r3) 's Twitter Profile Photo

Angelboy (Angelboy) will give a talk at #OffensiveCon this week! Following his deep dive into Kernel Streaming vulnerabilities, this week, Angelboy will unveil a new set of bug classes discovered through his research on one of the most common input sources – webcam frames.

Angelboy (<a href="/scwuaptx/">Angelboy</a>) will give a talk at #OffensiveCon this week!

Following his deep dive into Kernel Streaming vulnerabilities, this week, Angelboy will unveil a new set of bug classes discovered through his research on one of the most common input sources – webcam frames.
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Our first confirmation of #Pwn2Own Berlin! Pumpkin (Pumpkin 🎃) from DEVCORE Research Team used an integer overflow to escalate privs on Red Hat Linux. He earns $20,000 and 2 Master of Pwn points. #P2OBerlin

Our first confirmation of #Pwn2Own Berlin! Pumpkin (<a href="/u1f383/">Pumpkin 🎃</a>) from DEVCORE Research Team used an integer overflow to escalate privs on Red Hat Linux. He earns $20,000 and 2 Master of Pwn points. #P2OBerlin
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

We have another collision. Although Angelboy (Angelboy) from DEVCORE Research Team successfully demonstrated their privilege escalation on Windows 11, 1 of the 2 bugs he used was known to the vendor. He still wins $11,250 and 2.25 Master of Pwn points. #Pwn2Own

We have another collision. Although Angelboy (<a href="/scwuaptx/">Angelboy</a>) from DEVCORE Research Team successfully demonstrated their privilege escalation on Windows 11, 1 of the 2 bugs he used was known to the vendor. He still wins $11,250 and 2.25 Master of Pwn points. #Pwn2Own
DEVCORE (@d3vc0r3) 's Twitter Profile Photo

Our latest deep dive explores research on Windows Kernel Streaming. Check out Angelboy’s (Angelboy) write-up for key insights and analysis. Read more here: devco.re/blog/2025/05/1… #VulnerabilityResearch #Cybersecurity #WindowsKernel #OffensiveCon

DEVCORE (@d3vc0r3) 's Twitter Profile Photo

Check out Nini's (NiNi) blog on his experience with the #OffSec EXP-401 course and #OSEE certification exam! devco.re/blog/2025/05/2… We'll be hosting EXP-401 again in Taipei, alongside PEN-300 and WEB-300. Don’t miss out! training.devco.re/2025

Check out Nini's (<a href="/terrynini38514/">NiNi</a>) blog on his experience with the #OffSec EXP-401 course and #OSEE certification exam!
devco.re/blog/2025/05/2…

We'll be hosting EXP-401 again in Taipei, alongside PEN-300 and WEB-300. Don’t miss out!
training.devco.re/2025
DEVCORE (@d3vc0r3) 's Twitter Profile Photo

#Ubuntu’s new AppArmor-based sandbox aimed to limit untrusted access to user namespaces & io_uring. But it wasn’t foolproof. Pumpkin (Pumpkin 🎃)’s latest blog shows how he bypassed it—covering the issue, technical details & reporting process. devco.re/blog/2025/06/2… #Linux

#Ubuntu’s new AppArmor-based sandbox aimed to limit untrusted access to user namespaces &amp; io_uring.

But it wasn’t foolproof.

Pumpkin (<a href="/u1f383/">Pumpkin 🎃</a>)’s latest blog shows how he bypassed it—covering the issue, technical details &amp; reporting process.

devco.re/blog/2025/06/2…

#Linux
DEVCORE (@d3vc0r3) 's Twitter Profile Photo

How tough is the OffSec #OSEE exam? Orange (Orange Tsai 🍊) lays out his exam-prep journey, personal reflections, and the key lessons from the EXP-401 (AWE) course. Explore the full story (TC) here: devco.re/blog/2025/07/0…

How tough is the <a href="/offsectraining/">OffSec</a> #OSEE exam? 

Orange (<a href="/orange_8361/">Orange Tsai  🍊</a>) lays out his exam-prep journey, personal reflections, and the key lessons from the EXP-401 (AWE) course.

Explore the full story (TC) here: devco.re/blog/2025/07/0…
Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

Thanks PortSwigger and Bug Bounty Village for this awesome event — and also to my DEVCORE buddies for standing on stage to collect the trophy for me! A little follow-up article on this research is coming soon... stay tuned! 🤘

Thanks <a href="/PortSwigger/">PortSwigger</a> and <a href="/BugBountyDEFCON/">Bug Bounty Village</a> for this awesome event — and also to my <a href="/d3vc0r3/">DEVCORE</a> buddies for standing on stage to collect the trophy for me!

A little follow-up article on this research is coming soon... stay tuned! 🤘
DEVCORE (@d3vc0r3) 's Twitter Profile Photo

Congrats to Orange (Orange Tsai 🍊) for making PortSwigger’s Top 10 Web Hacking Techniques again — and to splitline (splitline 👁️🐈‍⬛) for the debut. #1 Confusion Attacks — Apache HTTP Server devco.re/blog/2024/08/0… #4 WorstFit — Windows ANSI devco.re/blog/2025/01/0… #DEFCON

Congrats to Orange (<a href="/orange_8361/">Orange Tsai  🍊</a>) for making <a href="/PortSwigger/">PortSwigger</a>’s Top 10 Web Hacking Techniques again — and to splitline (<a href="/_splitline_/">splitline 👁️🐈‍⬛</a>) for the debut.

#1 Confusion Attacks — Apache HTTP Server
devco.re/blog/2024/08/0…

#4 WorstFit — Windows ANSI
devco.re/blog/2025/01/0…

#DEFCON