Mitsurugi Heishiro (@0xmitsurugi) 's Twitter Profile
Mitsurugi Heishiro

@0xmitsurugi

Reverse, exploit, pwn. My blade is angry... Want a taste?! The name's 0xMitsurugi. Don't forget it. Member of HexpressoCTF twitter.com/hexpressoctf

ID: 2204871703

linkhttp://0x90909090.blogspot.fr/ calendar_today20-11-2013 12:59:58

578 Tweet

1,1K Followers

125 Following

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Success! Synacktiv was able to execute a heap-based buffer overflow in the kernel triggered via WiFi and leading to RCE against the Wyze Cam v3. They earn $15,000 and 3 Master of Pwn points. #Pwn2Own

Success! Synacktiv was able to execute a heap-based buffer overflow in the kernel triggered via WiFi and leading to RCE against the Wyze Cam v3. They earn $15,000 and 3 Master of Pwn points. #Pwn2Own
Synacktiv (@synacktiv) 's Twitter Profile Photo

Our ninjas, myr and Pierre Milioni, have uncovered various vulnerabilities in Peplink Balance Two devices, including command injection and authorization issues. Secure your devices: upgrade to version 8.4.0! 🔒 Get full technical details here: synacktiv.com/sites/default/…

Synacktiv (@synacktiv) 's Twitter Profile Photo

To facilitate reverse-engineering of large programs, vulnerability research and root-cause analysis on iOS, Android, and other major platforms, myr and Hexa released Frinet, a tool combining Frida with an enhanced version of Tenet. synacktiv.com/publications/f…

Hexacon (@hexacon_fr) 's Twitter Profile Photo

Save the date for #HEXACON2024 ✨ 📅 4th & 5th of October 2024 Same place, same team, even more root shells 🔥 More details coming soon… hexacon.fr

Synacktiv (@synacktiv) 's Twitter Profile Photo

Synacktiv is looking for an additional team leader for its Reverse-Engineering Team! Find out if you are a good candidate by reading our offer (🇫🇷). synacktiv.com/responsable-de…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Most impressive! The ninjas from Synacktiv needed less that 30 seconds to demonstrate their exploit on the Tesla ECU with Vehicle (VEH) CAN BUS Control. The attempt was done in an RF enclosure to ensure no passers by were impacted. #Pwn2Own

Most impressive! The ninjas from <a href="/Synacktiv/">Synacktiv</a> needed less that 30 seconds to demonstrate their exploit on the Tesla ECU with Vehicle (VEH) CAN BUS Control. The attempt was done in an RF enclosure to ensure no passers by were impacted. #Pwn2Own
BiereSecuLyon (@biereseculyon) 's Twitter Profile Photo

🍻 Le prochain Bière&Sécu Lyon aura lieu mardi 16 avril à 19:00 au Peaky Blinders ! Au programme : - "Jia Tan, sa vie, son œuvre et la backdoor xz" - Mitsurugi Heishiro - "Falco + Kube = Max(Count(RCE))" - Laluka@OffenSkill - "Les vrais hackers ne laissent pas de traces" - BlackOut

🍻 Le prochain Bière&amp;Sécu Lyon aura lieu mardi 16 avril à 19:00 au Peaky Blinders ! Au programme :
- "Jia Tan, sa vie, son œuvre et la backdoor xz" - <a href="/0xmitsurugi/">Mitsurugi Heishiro</a> 
- "Falco + Kube = Max(Count(RCE))" - <a href="/TheLaluka/">Laluka@OffenSkill</a>
- "Les vrais hackers ne laissent pas de traces" - <a href="/contact_out/">BlackOut</a>
Hexacon (@hexacon_fr) 's Twitter Profile Photo

A few tickets for #HEXACON2024 are still on sale, don't miss them! Register for our top-notch trainings and learn from the best in the industry 🎓 hexacon.fr/register/

A few tickets for #HEXACON2024 are still on sale, don't miss them!

Register for our top-notch trainings and learn from the best in the industry 🎓

hexacon.fr/register/
TheZDIBugs (@thezdibugs) 's Twitter Profile Photo

[ZDI-24-837|CVE-2024-6246] (Pwn2Own) Wyze Cam v3 Realtek Wi-Fi Driver Heap-Based Buffer Overflow Remote Code Execution Vulnerability (CVSS 9.6; Credit: vdehors, Mitsurugi Heishiro, Areizen from Synacktiv) zerodayinitiative.com/advisories/ZDI…

Mitsurugi Heishiro (@0xmitsurugi) 's Twitter Profile Photo

Can LLM help vulnerabilty researcher to find vulns? Short answer : no Long answer : also no, but explained in a blogpost 😆 0x90909090.blogspot.com/2024/09/using-…