sinusoid (@the_bit_diddler) 's Twitter Profile
sinusoid

@the_bit_diddler

ID: 757648339630522368

calendar_today25-07-2016 18:46:55

2,2K Tweet

1,1K Followers

1,1K Following

Jack Ren (@bjrjk) 's Twitter Profile Photo

Analysis and Exploit for CVE-2024-8381, a SpiderMonkey Interpreter Type Confusion Bug! Unfortunately, due to nature of this bug, exploit is only applicable when ASLR is disabled. Shoutout to Nils Bars for finding this bug. github.com/bjrjk/CVE-2024…

starlabs (@starlabs_sg) 's Twitter Profile Photo

We're super stoked to publish this post. A huge shoutout to our former intern, rainbowpigeon who poured his heart & soul into this 7-8 months ago. It took us a bit to polish it up but we're incredibly proud of him. Dive in & let us know what you think! starlabs.sg/blog/2025/12-m…

naci (@_nnaci) 's Twitter Profile Photo

I discuss the creation of Mergen, VM based obfuscations, and explore how compiler techniques are used for reverse engineering and deobfuscation. nac-l.github.io/2025/01/25/lif…

Chris Thompson (@_mayyhem) 's Twitter Profile Photo

Found a .NET method on SCCM site servers that can be called to decrypt secrets stored in the site DB a while back with Garrett and Lee Chagolla-Christensen. Another alternative to 🥝🏳️‍🌈 Benjamin Delpy's mimikatz misc::sccm, Adam Chester 🏴‍☠️'s C# gist, and Sanjiv Kawa's SQLRecon. github.com/subat0mik/Misc…

chebuya (@_chebuya) 's Twitter Profile Photo

Found an SSRF in Sliver C2 (CVE-2025-27090), allowing an attacker to read and write TCP traffic through affected teamservers. Demo shows leaking the IP of a Sliver teamserver hidden behind redirectors Writeup and PoC in replies

freefirex (@freefirex2) 's Twitter Profile Photo

Would you like to transition from local user to cloud access w/o having to dump browser cookies or hope SSO via kerberos is enabled? 🧵

Would you like to transition from local user to cloud access w/o having to dump browser cookies or hope SSO via kerberos is enabled? 🧵
Vector 35 (@vector35) 's Twitter Profile Photo

We've open-sourced another core Binary Ninja feature: SCC. If you're not familiar with it, the Shellcode Compiler has been built-in to BN from the beginning, allowing you to build small PIE shellcode in a variety of architectures right from the UI: scc.binary.ninja

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

New #BinaryNinja plugin: Obfuscation Analysis Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly. Co-authored by nicolodev; available in the plugin manager. github.com/mrphrazer/obfu…