Lucas Leong (@_wmliang_) 's Twitter Profile
Lucas Leong

@_wmliang_

Play hard, Exploit hard
@[email protected]

ID: 2182704780

calendar_today08-11-2013 18:27:20

1,1K Tweet

2,2K Followers

532 Following

Andrey Konovalov (@andreyknvl) 's Twitter Profile Photo

Wrote a trigger for CVE-2025-38494/5 (an integer underflow in the HID subsystem) that leaks 64 KB of OOB memory over USB. Still works on Pixels and Ubuntus (but the bug is fixed in stable kernels). github.com/xairy/kernel-e…

Wrote a trigger for CVE-2025-38494/5 (an integer underflow in the HID subsystem) that leaks 64 KB of OOB memory over USB.

Still works on Pixels and Ubuntus (but the bug is fixed in stable kernels).

github.com/xairy/kernel-e…
Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

We have an exciting piece of vulnerability research 🕵️‍♂️ to share, conducted in collaboration with external researchers from VU Amsterdam. Find out more about the L1TF vulnerability, a CPU vulnerability on some Intel CPUs (Skylake and older). goo.gle/3I69VDv

Filip Jerzy Pizło (@filpizlo) 's Twitter Profile Photo

Pizlix: the world's first memory safe Linux distro. I'm writing the primordial README for it now and doing a final test that `./build.sh` actually works. The I'll commit it to the Fil-C repo

Pizlix: the world's first memory safe Linux distro.

I'm writing the primordial README for it now and doing a final test that `./build.sh` actually works. The I'll commit it to the Fil-C repo
Alastair Donaldson (@afd_icl) 's Twitter Profile Photo

Interested in practical tips for using agentic LLMs for vulnerability detection? Check out this tech report from the Fuzzing Brain team, who reached the finals of AIxCC. It was a pleasure to be involved in this effort! arxiv.org/pdf/2509.07225

Interested in practical tips for using agentic LLMs for vulnerability detection? Check out this tech report from the Fuzzing Brain team, who reached the finals of AIxCC. It was a pleasure to be involved in this effort!

arxiv.org/pdf/2509.07225
Google DeepMind (@googledeepmind) 's Twitter Profile Photo

Software vulnerabilities can be notoriously time-consuming for developers to find and fix. Today, we’re sharing details about CodeMender: our new AI agent that uses Gemini Deep Think to automatically patch critical software vulnerabilities. 🧵

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing: Trend ZDI researcher Simon Zuckerbraun shows how to go from a crash to a full exploit - & he provides you tools to do the same, including his technique used to get ROP execution. zerodayinitiative.com/blog/2025/10/6…

Team Atlanta (@teamatlanta24) 's Twitter Profile Photo

A crash feels like being stranded on Mars. No rescue. No signals. Just you… and the logs. Meet Martian — our AI patch agent that fixes the unfixable. Exploring the unknown, one bug at a time. 🔗 team-atlanta.github.io/blog/post-crs-… #AIxCC #AICyberChallenge #LLM #GenAI #AIForSecurity

Connor McGarr (@33y0re) 's Twitter Profile Photo

Today I am releasing a new blog on Windows on ARM! It comes from the perspective of one, like myself, who comes from an x86 background and is new, but, interested in Windows on ARM! ELs, OS & hypervisor behavior (with VBS), virtual memory, paging, & more! connormcgarr.github.io/arm64-windows-…

Lukasz Olejnik (@lukolejnik) 's Twitter Profile Photo

Remember HackingTeam? They're back as Memento Labs. Their tools were used vs media, universities, government, financial institutions in Russia. Phishing + Chrome 0-day exploit. Just clicking a link was enough for full infection. Quite a disclosure. securelist.com/forumtroll-apt…

idkhidden (@idkhiddenwtf) 's Twitter Profile Photo

made an IDA plugin that tracks the time you spend in IDA and displays a leaderboard github.com/idkhidden/touc… int3.club/touchgrass/

made an IDA plugin that tracks the time you spend in IDA and displays a leaderboard
github.com/idkhidden/touc…
int3.club/touchgrass/
D4m0n (@d4m0n_8) 's Twitter Profile Photo

It’s time to publish the blog post about the bug that won at P2O Berlin 2025. Enjoy! With this post, I mark my last moment as a researcher at Out of Bounds. I’m moving on to a new place for a fresh start.🔥🦎 oobs.io/posts/four-byt…

Seth Jenkins (@__sethjenkins) 's Twitter Profile Photo

We really should be talking about this more....KASLR is just not working properly on Android right now, and it hasn't for a long time. googleprojectzero.blogspot.com/2025/11/defeat…

Michael Niedermayer (@michael__ni) 's Twitter Profile Photo

I am the main developer fixing security issues in FFmpeg. I have fixed over 2700 google oss fuzz issues. I have fixed most of the BIGSLEEP issues. And i disagree with the comments @ffmpeg (Kieran) has made about google. From all companies, google has been the most helpfull & nice

immortalp0ny (@immortalp0ny) 's Twitter Profile Photo

After several attempts I made a segment heap visualizer. It render 2.5kkk chunks of kernel pool for 360ms. It is a handy tool for visual exploits debugging. github.com/immortalp0ny/p…

After several attempts I made a segment heap visualizer. It  render 2.5kkk chunks of kernel pool for 360ms. It is a handy tool for visual exploits debugging.  

github.com/immortalp0ny/p…
Tavis Ormandy (@taviso) 's Twitter Profile Photo

Sometimes it really is a cpu bug 😂 A weird AVX512 bug on Zen 4 (Genoa) just got officially confirmed as erratum 1514 in the latest spec update. There's a workaround/chicken bit too. My testcase: godbolt.org/z/4zE8svEPK

Sometimes it really is a cpu bug 😂 A weird AVX512 bug on Zen 4 (Genoa)  just got officially confirmed as erratum 1514 in the latest spec update. There's a workaround/chicken bit too.

My testcase: godbolt.org/z/4zE8svEPK
incendiumrocks (@incendiumrockz) 's Twitter Profile Photo

My new blog describes a vulnerability in Windows that allows a low privileged user or guest to remotely crash the Spooler service in Windows by one simple call. incendium.rocks/posts/Remotely…

itszn (@itszn13) 's Twitter Profile Photo

Don't forget to checkout the full writeup with extra details! You can even create your own MD5 collision in browser: stackchk.fail/blog/jxl_hashq…

Anthropic (@anthropicai) 's Twitter Profile Photo

New on our Frontier Red Team blog: We tested whether AIs can exploit blockchain smart contracts. In simulated testing, AI agents found $4.6M in exploits. The research (with MATS Research and the Anthropic Fellows program) also developed a new benchmark: red.anthropic.com/2025/smart-con…