Alexandre Becholey (@0xabe_io) 's Twitter Profile
Alexandre Becholey

@0xabe_io

0xabe.bsky.social

ID: 985196617

linkhttps://0xabe.io calendar_today02-12-2012 18:58:49

1,1K Tweet

338 Followers

464 Following

Alexandre Becholey (@0xabe_io) 's Twitter Profile Photo

There is a lot of new content and we are pretty sure you will enjoy it. You can have a sneak peak on the V8 type confusion module I added to section 2 on the Off by One Security stream: youtu.be/kuAfEcQAD6o

Pedro Ribeiro (@pedrib1337) 's Twitter Profile Photo

We are looking for a junior security researcher 🤠 No university degree or previous work experience required, but MUST be able to demonstrate interest in the field and some basic skills by either: 1. Have published blog post detailing 0-day vulnerability (found by yourself)

Hexacon (@hexacon_fr) 's Twitter Profile Photo

We've already received many high-quality submissions to our CFP, thank you! 🚀 Don't miss your chance to submit before July 14! 📅 hexacon.fr/conference/cal…

ö (@r0keb) 's Twitter Profile Photo

Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, internal structures, and how Segment Heap, LFH, and VS work. r0keb.github.io/posts/Windows-…

Mathias Fuchs (@mathias_fuchs) 's Twitter Profile Photo

Attackers love RDP for sneaky lateral moves—but every pixel leaves a clue! 🕵️‍♂️ Check out my latest blog on tracking attackers through logs, bitmap caches, and clipboard trails (plus a printer tale too funny to miss). #DFIR #BlueTeam #CyberSecurity medium.com/@mathias.fuchs…

Samuel Groß (@5aelo) 's Twitter Profile Photo

We released our Fuzzilli-based V8 Sandbox fuzzer: github.com/googleprojectz… It explores the heap to find interesting objects and corrupts them in a deterministic way using V8's memory corruption API. Happy fuzzing!

Meysam (@r00tkitsmm) 's Twitter Profile Photo

𝗖𝗩𝗘-𝟮𝟬𝟮𝟱-𝟮𝟳𝟬𝟲𝟮 is one of my favorite Linux kernel vulnerabilities that we have discovered/exploited together with my brilliant former colleague Slava Moskvin | Path Cybersec docs.qualcomm.com/product/public…

Outflank (@outflanknl) 's Twitter Profile Photo

Black Hat Bonus: Learn more about Kyle Avery 's research on training self-hosted LLMs to generate evasive malware and creation of a 7B parameter model that generates evasive Cobalt Strike shellcode loaders able to bypass Microsoft Defender for Endpoint. ow.ly/1EUf50WBI5e

Black Hat Bonus: Learn more about <a href="/kyleavery_/">Kyle Avery</a> 's research on training self-hosted LLMs to generate evasive malware and creation of a 7B parameter model that generates evasive Cobalt Strike shellcode loaders able to bypass Microsoft Defender for Endpoint. ow.ly/1EUf50WBI5e
stephen (@_tsuro) 's Twitter Profile Photo

If you like Chrome IPC shenanigans like this, you might also enjoy my talk from black hat 25: youtu.be/qhhJCLy0YBA?si…

Stephen Sims (@steph3nsims) 's Twitter Profile Photo

Hey Austin folks (or close by), this is a great opportunity to speak at this event. We have the amazing Pedram Amini and Marcus J. Carey delivering the keynotes, and a great line up of amazing speakers and workshops. We'd love to hear from you if you have a talk!

0xor0ne (@0xor0ne) 's Twitter Profile Photo

We’re hiring offensive security researchers Apple SEAR! We’re looking for skilled researchers across multiple security domains. Learn more and apply here: jobs.apple.com/en-us/details/… If you’re into low level systems like firmware, RTOS, coprocessors, embedded components, or

MSec Operations (@msecops) 's Twitter Profile Photo

Tools such as PsExec.py from Impacket are usually flagged for lateral movement due to the pre-built service executable that is dropped on the remote system. However, some vendors also flag Impacket based on its behaviour. With RustPack, you can easily create

Alexandre Becholey (@0xabe_io) 's Twitter Profile Photo

I've just finished teaching the new version of @sans sec760. What a blast to present it to students for the first time. Thank you all for your participation and interaction, it was a lot of fun. More info: sans.org/cyber-security…

BSides Pyongyang (@bsidespyongyang) 's Twitter Profile Photo

We’re less than 1 hour away from #BSidesPyongyang2025, and western dissidents have already tried to stop our supreme conference by targeting #CloudFlare. THE SHOW MUST GO ON!

We’re less than 1 hour away from #BSidesPyongyang2025, and western dissidents have already tried to stop our supreme conference by targeting #CloudFlare.

THE SHOW MUST GO ON!