Altin (tin-z) (@kzalloc1) 's Twitter Profile
Altin (tin-z)

@kzalloc1

insecurity researcher || life &﹥ /dev/null; infosec.exchange/@kzalloc1

No pain, no oday. No oday, double pain

ID: 1173581295827505153

linkhttps://tin-z.github.io/ calendar_today16-09-2019 12:56:32

202 Tweet

176 Followers

935 Following

Keruis (@yutongwu111140) 's Twitter Profile Photo

C++23's std::stacktrace makes printing call stacks more convenient, eliminating the need for platform-specific APIs and reducing redundant work across different platforms

C++23's std::stacktrace makes printing call stacks more convenient, eliminating the need for platform-specific APIs and reducing redundant work across different platforms
s1r1us (@s1r1u5_) 's Twitter Profile Photo

sooner or later, the google deepmind team will distill the entire chromium codebase into gemini and let it uncover vulnerabilities. for bug in issue_tracker: find similar bugs variant analysis on steroids. this is the future

OpenSecurityTraining2 (@opensectraining) 's Twitter Profile Photo

💥We've reached 27k registered students!🔥 We've also updated all the learning paths at ost2.fyi/Learning%20Pat… Go check out the latest updates, and if you see a class as a white box, that means we're looking for volunteers to teach it!

atc1441 (@atc1441) 's Twitter Profile Photo

Made a simple repo with the currently ~100 available firmware files of Telink TLSR Based Xiaomi devices for anyone searching for hackable devices 🙌 github.com/atc1441/Xiaomi… Another set of all ~9000 devices of different SoC's might come later 😅

Made a simple repo with the currently ~100 available firmware files of Telink TLSR Based Xiaomi devices for anyone searching for hackable devices 🙌
github.com/atc1441/Xiaomi…

 Another set of all ~9000 devices of different SoC's might come later 😅
f00fc7c800 (@f00fc7c800) 's Twitter Profile Photo

Small teaser , location is Timisoara, Romania but venue is not yet decided till I have all the people confirmed :) please register only if you consider coming physically . it's just one stage no qualifier. More to be revealed soon :)

Small teaser , location is Timisoara, Romania but venue is not yet decided till I have all the people confirmed :) please register only if you consider coming physically . it's just one stage no qualifier. More to be revealed soon :)
Alexandre Borges (@ale_sp_brazil) 's Twitter Profile Photo

So far, I have already written 15 articles (1045 pages), which have been published on my blog: blog: exploitreversing.com ERS: Exploiting Reversing Series (currently at 439 pages, with continued progress underway): [+] ERS 05: exploitreversing.com/2025/03/12/exp… [+] ERS 04:

So far, I have already written 15 articles (1045 pages), which have been published on my blog:

blog: exploitreversing.com

ERS: Exploiting Reversing Series (currently at 439 pages, with continued progress underway): 

[+] ERS 05: exploitreversing.com/2025/03/12/exp…
[+] ERS 04:
‌Renwa (@renwax23) 's Twitter Profile Photo

Since Apple doesn’t care, I don’t care either. Here are the details of an address bar spoof vulnerability in Safari on Mac using custom cursor overlap - Apple said it’s *not* a vulnerability. github.com/RenwaX23/X/blo…

Altin (tin-z) (@kzalloc1) 's Twitter Profile Photo

I don't know if this could help someone, but I found that taking creatine in the morning instead of coffee helped me to reach a good level of brain activity similar to when I was younger. So, if you don't have kidney issues, this might help you too

ptr-yudai (@ptryudai) 's Twitter Profile Photo

Here's my writeup for kinc from BlackHat MEA 2025 Quals. It introduces Dirty Pageflags, a new exploitation technique inspired by Dirty Pagetable. Big thanks to Dronex for the great discussions! ptr-yudai.hatenablog.com/entry/2025/09/…

/r/netsec (@_r_netsec) 's Twitter Profile Photo

Quite cool, apk.sh supports direct bytecode manipulation with no decompilation, this avoids recompilation errors when patching an Android APK. shorturl.cc/dJv

clearbluejar (@clearbluejar) 's Twitter Profile Photo

This analysis was brought to you by the ipsw and ghidriff toolchain, plus some AI glue. I'll be dropping all the new research on automating Apple patch analysis at my talk "Reverse Engineering Apple Security Updates" at OBTS v8. Stop guessing, start knowing! #OBTSv8

watchTowr (@watchtowrcyber) 's Twitter Profile Photo

Today, we publish our analysis of CVE-2025-3600 that we discovered in Telerik UI, a prolific library used in hundreds of thousands of applications. Tagged as a Denial of Service vulnerability, today we go deeper and demonstrate RCE scenarios.. labs.watchtowr.com/more-than-dos-…