Danis Jiang (@danis_jiang) 's Twitter Profile
Danis Jiang

@danis_jiang

Yuhao Jiang / former ctfer @ Vidar-Team / Security Researcher @ Ant Group Light-Year Security Lab / GeekPwn 2022 / Pwnie Awards 2023 / Tianfu Cup 2023

ID: 1555200325862432768

calendar_today04-08-2022 14:34:00

150 Tweet

2,2K Takipçi

1,1K Takip Edilen

GEEKCON (@geekcontop) 's Twitter Profile Photo

GEEKCON is hiring Research & Operations Interns! Join the world’s top hacker event, dive into smart devices, Web3, AI & more, and work with top cybersecurity talent! Details in pic. 📍 West Bund, Shanghai 🗓️ 3+ months, on-site 💌 Apply: [email protected] Stay curious, stay

P4nda (@p4nda20371774) 's Twitter Profile Photo

Our slides about WASM bugs in browsers are now available. Thanks to everyone who helped with the talk.🫡 Hope we can do better next time. 1. BH USA 2024: i.blackhat.com/BH-US-24/Prese… 2. GeekCon Shanghai 2024: geekcon.top/js/pdfjs/web/v… cc my partners (P1umer xmzyshypnc Q1IQ)

Pumpkin 🎃 (@u1f383) 's Twitter Profile Photo

Dropped my slide for POC2024 on Linux kernel exploitation, including a journal from Pwn2Own Vancouver earlier this year. Enjoy 🙂. u1f383.github.io/slides/talks/2…

starlabs (@starlabs_sg) 's Twitter Profile Photo

🎄 All I Want for Christmas is a CVE-2024-30085 Exploit 🎄 As always, we at starlabs are sharing what we learnt. This time, it's brought to you by Cherie-Anne Lee starlabs.sg/blog/2024/all-…

VictorV (@vv474172261) 's Twitter Profile Photo

I'm unable to join the conference Insomni’hack 2025, so I write a part of content into a blog, hope you enjoy my blog. v-v.space/2025/02/18/Azu…

k0shl (@keyz3r0) 's Twitter Profile Photo

Excited to announce our talk has been accepted by Black Hat #BHUSA!🥳🥳🥳 In my part of presentation, I’ll cover logic-based pre-auth remote vulnerabilities uncovered via novel abuse of Windows native HTTP API. Can't wait to see y'all in Las Vegas! blackhat.com/us-25/briefing…

Excited to announce our talk has been accepted by
<a href="/BlackHatEvents/">Black Hat</a> #BHUSA!🥳🥳🥳
In my part of presentation, I’ll cover logic-based pre-auth remote vulnerabilities uncovered via novel abuse of Windows native HTTP API. 
Can't wait to see y'all in Las Vegas!
blackhat.com/us-25/briefing…
Alon Leviev (@alon_leviev) 's Twitter Profile Photo

I am beyond thrilled to share that Netanel Ben Simon and I have been accepted to present at Black Hat USA 2025! We will present our talk "BitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secrets", where we share our VR journey of WinRE! See you there! #BHUSA

I am beyond thrilled to share that <a href="/NetanelBenSimon/">Netanel Ben Simon</a> and I have been accepted to present at <a href="/BlackHatEvents/">Black Hat</a> USA 2025!

We will present our talk "BitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secrets", where we share our VR journey of WinRE!

See you there!

#BHUSA
Danis Jiang (@danis_jiang) 's Twitter Profile Photo

Our talk "Dark Corners: How a Failed Patch Left VMware ESXi VM Escapes Open for Two Years" has been accepted by BlackHat USA 2025! Super excited to present this work with 0x140ce and Ezrak1e. See you at #BHUSA! Black Hat blackhat.com/us-25/briefing…

Our talk "Dark Corners: How a Failed Patch Left VMware ESXi VM Escapes Open for Two Years" has been accepted by BlackHat USA 2025!

Super excited to present this work with <a href="/0x140ce/">0x140ce</a> and <a href="/ezrak1e/">Ezrak1e</a>. See you at #BHUSA! <a href="/BlackHatEvents/">Black Hat</a>

blackhat.com/us-25/briefing…
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Outstanding! Nguyen Hoang Thach (Thach Nguyen Hoang 🇻🇳) of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a first in #Pwn2Own history. He earns $150,000 and 15 Master of Pwn points. #P2OBerlin

Outstanding! Nguyen Hoang Thach (<a href="/hi_im_d4rkn3ss/">Thach Nguyen Hoang 🇻🇳</a>) of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a first in #Pwn2Own history. He earns $150,000 and 15 Master of Pwn points. #P2OBerlin
Danis Jiang (@danis_jiang) 's Twitter Profile Photo

Claude Code is insane. The help I get from it far exceeds directly chatting with Sonnet. This is the best LLM agent I've ever used.

Pumpkin 🎃 (@u1f383) 's Twitter Profile Photo

A bit late, but I just published my blog post on bypassing Ubuntu’s sandbox! Hope you enjoy it! u1f383.github.io/linux/2025/06/…

Danis Jiang (@danis_jiang) 's Twitter Profile Photo

Had another VMware VM escape talk at BlackHat today. Hope you found it interesting😉. I’ll let you know when the slides are available. #BHUSA #BlackHatEvent #VMware

Had another VMware VM escape talk at BlackHat today. Hope you found it interesting😉. I’ll let you know when the slides are available.

#BHUSA #BlackHatEvent #VMware
Danis Jiang (@danis_jiang) 's Twitter Profile Photo

Our “Dark Corners: How a Failed Patch Left VMware ESXi VM Escapes Open for Two Years” slides are now available! This research was a collaborative effort with 0x140ce, Ezrak1e and myself. In this talk, we introduce the ESXi virtual machine escape and sandbox escape

k0shl (@keyz3r0) 's Twitter Profile Photo

Our slide is online: i.blackhat.com/BH-USA-25/Pres… Glad to share our pre-auth DoS & RCE bug hunting research at #BHUSA! Thanks Black Hat for the pre-recording, as we couldn’t attend in person this time for personal reasons. Questions? DM us VictorV wei zhiniang peng

Our slide is online: i.blackhat.com/BH-USA-25/Pres…

Glad to share our pre-auth DoS &amp; RCE bug hunting research at #BHUSA! Thanks <a href="/BlackHatEvents/">Black Hat</a> for the pre-recording, as we couldn’t attend in person this time for personal reasons. Questions? DM us <a href="/vv474172261/">VictorV</a> <a href="/XiaoWei___/">wei</a> <a href="/edwardzpeng/">zhiniang peng</a>