Jack (@addr_limit) 's Twitter Profile
Jack

@addr_limit

Senior Exploit Developer @InterruptLabs

ID: 1705105755039248385

linkhttp://xploit.dev calendar_today22-09-2023 06:24:39

15 Tweet

93 Followers

360 Following

Interrupt Labs (@interruptlabs) 's Twitter Profile Photo

We continue to look for Vuln Researchers in the UK, US and Australia with potential options for remote folk... jobs.gohire.io/interrupt-labs…

chompie (@chompie1337) 's Twitter Profile Photo

You don’t FIND exploits. You build them. You FIND vulnerabilities and exploit them. As an exploit developer that has failed to exploit lots of bugs that look good, the distinction is important 😭

Interrupt Labs (@interruptlabs) 's Twitter Profile Photo

Waiter, can I get Semgrep with my Binja? Checkout this plugin that our intern developed to bring native Semgrep support to Binary Ninja! interruptlabs.co.uk/articles/integ…

Antoon Purnal (@purnaltoon) 's Twitter Profile Photo

I recently found an exploitable timing leak in the reference implementation of Kyber (ML-KEM), the soon-to-be NIST standard for post-quantum key encapsulation. Let’s see if you can spot it in the source code - msg is secret:

I recently found an exploitable timing leak in the reference implementation of Kyber (ML-KEM), the soon-to-be NIST standard for post-quantum key encapsulation.

Let’s see if you can spot it in the source code - msg is secret:
h0mbre (@h0mbre_) 's Twitter Profile Photo

code auditing for exploitable bugs is a lot of labor. building fuzzers to find exploitable bugs is a lot of labor. stop trying to find shortcuts. expect to put in a lot of time and sustained effort. can’t be frustrated when you haven’t put in the effort

Interrupt Labs (@interruptlabs) 's Twitter Profile Photo

A fantastic opportunity for an experienced vulnerability researcher to join our word-class Browsers team. Remote work, hybrid or in office opportunities available. Check out our careers page for the full range of roles available globally. buff.ly/4apXYC1

Interrupt Labs (@interruptlabs) 's Twitter Profile Photo

📣 Exciting news for aspiring vulnerability researchers - a selection of our internal VR Development Program training resources are now available on GitHub! Check them out at github.com/interruptlabs/… These ones are on software development: programming in C and Python.

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Bang! Interrupt Labs successfully took over the #Samsung Galaxy 25 with 1 click. They remotely enabled the camera and location services, which has some frightening privacy implications. They head off to the disclosure room to explain how it works. #Pwn2Own

Ben (@xploitbengineer) 's Twitter Profile Photo

I posted a short blog about how a Samsung GPU vulnerability (CVE-2025-21479) can be leveraged for an LPE on affected devices xploitbengineer.github.io/CVE-2025-21479