evan (@stargravy) 's Twitter Profile
evan

@stargravy

tryin to hack stuff

ID: 3380285668

linkhttps://evangrant.ca calendar_today17-07-2015 11:51:22

207 Tweet

353 Followers

903 Following

Horizon3 Attack Team (@horizon3attack) 's Twitter Profile Photo

Session keys and passwords aplenty, here’s our deep-dive for CVE-2025-5777, aka CitrixBleed 2. Apart from the normal root-cause analysis, we’ve doubled down on actionable steps to investigate Indicators of Compromise. horizon3.ai/attack-researc…

Source Incite (@sourceincite) 's Twitter Profile Photo

Here is a really cool blog post by wasamasa whos is a past student of our FSWA class: emacsninja.com/posts/cve-2025…. You can find them on Mastodon: lonely.town/@wasamasa/

Horizon3 Attack Team (@horizon3attack) 's Twitter Profile Photo

Our latest disclosures for CVE-2025-8355 and CVE-2025-8356 - discovering a critical RCE in Xerox FreeFlow Core horizon3.ai/attack-researc…

Rapid7 (@rapid7) 's Twitter Profile Photo

🛜 What happens when the convenience of network-edge NAS devices goes terribly wrong? Read on via 'DisguiseDelimit', Ryan Emmons' main-stage #DEFCON33 talk-turned-whitepaper on his discovery of a critical Synology NAS vulnerability: r-7.co/4lvMm4q

🛜 What happens when the convenience of network-edge NAS devices goes terribly wrong?

Read on via 'DisguiseDelimit', <a href="/the_emmons/">Ryan Emmons</a>' main-stage #DEFCON33 talk-turned-whitepaper on his discovery of a critical Synology NAS vulnerability: r-7.co/4lvMm4q
TheZDIBugs (@thezdibugs) 's Twitter Profile Photo

[ZDI-25-799|CVE-2025-8651] (0Day) (Pwn2Own) Kenwood DMX958XR JKWifiService Command Injection Remote Code Execution Vulnerability (CVSS 6.8; Credit: Evan Grant) zerodayinitiative.com/advisories/ZDI…

Security BSides Dublin (@bsidesdublin) 's Twitter Profile Photo

📢Presentations📢 We are thrilled to announce that the presentations from #BsidesDublin2025 have now been uploaded to bsidesdub.ie/past/2025.php Thank you again to all our speakers

Josh (@boredpentester) 's Twitter Profile Photo

The story of how I almost pwned the Lexmark Postscript stack for Pwn2Own 2025... And I would have gotten away with it too, if it hadn't been for those meddling firmware updates! boredpentester.com/pwn2own-2025-p…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

We have another collision. Evan Grant (evan) used a single bug to exploit the QNAP TS-453E, but, unfortunately, it had been used earlier in the contest. He still earns $10,000 and 2 Master of Pwn points. #Pwn2Own

We have another collision. Evan Grant (<a href="/stargravy/">evan</a>) used a single bug to exploit the QNAP TS-453E, but, unfortunately, it had been used earlier in the contest. He still earns $10,000 and 2 Master of Pwn points. #Pwn2Own
Security BSides Dublin (@bsidesdublin) 's Twitter Profile Photo

📢Video Upload📢 Happy to announce that #BsidesDublin2025 talk recordings are now live on our YouTube youtube.com/@securitybside…

Stephen Fewer (@stephenfewer) 's Twitter Profile Photo

We just published our AttackerKB Rapid7 analysis of CVE-2025-12480. Disclosed yesterday, but patch back in July, its an access control bypass affecting not only Gladinet Triofox, but as we show, also Gladinet CentreStack. Analysis & RCE details here: attackerkb.com/topics/5C4wRy6…

We just published our AttackerKB <a href="/rapid7/">Rapid7</a> analysis of CVE-2025-12480. Disclosed yesterday, but patch back in July, its an access control bypass affecting not only Gladinet Triofox, but as we show, also Gladinet CentreStack. Analysis &amp; RCE details here: attackerkb.com/topics/5C4wRy6…
Horizon3 Attack Team (@horizon3attack) 's Twitter Profile Photo

Today we are disclosing the details of CVE-2025-64155, an unauth argument injection leading to root remote code execution affecting the Fortinet FortiSIEM. Find the technical details, indicators of compromise, and proof-of-concept exploit in the blog. horizon3.ai/attack-researc…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Collision! evan targeted the Grizzl-E Smart 40A with the Charging Connector Protocol/Signal Manipulation add-on, hitting two bug collisions, still earning $15,000 USD and 3 Master of Pwn points. #Pwn2Own #P2OAuto

Collision! <a href="/stargravy/">evan</a> targeted the Grizzl-E Smart 40A with the Charging Connector Protocol/Signal Manipulation add-on, hitting two bug collisions, still earning $15,000 USD and 3 Master of Pwn points. #Pwn2Own #P2OAuto
Horizon3 Attack Team (@horizon3attack) 's Twitter Profile Photo

Today we are disclosing the details of CVE-2025-40551, an unauth deserialization vuln leading to remote code execution affecting SolarWinds WebHelpDesk. Find the technical details, indicators of compromise, and proof-of-concept exploit in the blog. horizon3.ai/attack-researc…

watchTowr (@watchtowrcyber) 's Twitter Profile Photo

Someone knows Bash disgustingly well, and we love it. Here's our analysis of the Ivanti EPMM Pre-Auth RCE vulnerabilities - CVE-2026-1281 & CVE-2026-1340. This research fuels our technology, enabling our clients to accurately determine their exposure. labs.watchtowr.com/someone-knows-…

Stephen Fewer (@stephenfewer) 's Twitter Profile Photo

We just published our Rapid7 analysis of CVE-2026-1731, a critical command injection affecting BeyondTrust Privileged Remote Access (PRA) & Remote Support (RS). Unauthenticated RCE, with a root cause due to Bash arithmetic evaluation. Analysis/PoC here: attackerkb.com/topics/jNMBccs…

Stephen Fewer (@stephenfewer) 's Twitter Profile Photo

Today we are disclosing CVE-2026-2329, a critical unauthenticated stack-based buffer overflow vulnerability affecting the Grandstream GXP1600 series of VoIP phones. Check out our disclosure over on the Rapid7 blog, including technical details for unauthenticated RCE, and

Today we are disclosing CVE-2026-2329, a critical unauthenticated stack-based buffer overflow vulnerability affecting the Grandstream GXP1600 series of VoIP phones. Check out our disclosure over on the <a href="/rapid7/">Rapid7</a> blog, including technical details for unauthenticated RCE, and