
Adam 'pi3' Zabrocki
@adam_pi3
Director of Offensive Security @NVIDIA, architecting @RISC_V, @LKRG_org Founder, @BlackHatEvents & @Defcon Speaker, #Phrack author, @PwnieAwards nominee
ID: 3268452193
http://pi3.com.pl 04-07-2015 20:28:30
758 Tweet
2,2K Followers
313 Following


Looks like this Timesys is now Lynx! Corporation did an amazing job [SARCASM] selling their Timesys Kernel Hardening Analysis Tool that simply provides the recommendations from my open source project kernel-hardening-checker. They don't even mention kernel-hardening-checker. Shame on them👎
![Alexander Popov (@a13xp0p0v) on Twitter photo Looks like this <a href="/Timesys/">Timesys is now Lynx!</a> Corporation did an amazing job [SARCASM] selling their Timesys Kernel Hardening Analysis Tool that simply provides the recommendations from my open source project kernel-hardening-checker.
They don't even mention kernel-hardening-checker. Shame on them👎 Looks like this <a href="/Timesys/">Timesys is now Lynx!</a> Corporation did an amazing job [SARCASM] selling their Timesys Kernel Hardening Analysis Tool that simply provides the recommendations from my open source project kernel-hardening-checker.
They don't even mention kernel-hardening-checker. Shame on them👎](https://pbs.twimg.com/media/GsWOdMOXcAA82Hr.jpg)

Thank you RISC-V International for appreciating my work on improving RISC-V ecosystem, what a nice surprise :) Pointer Masking (HWASAN) is there, HW CFI is there, next step - HW Memory Tagging (MTE) is coming! :)


Together with Alex Tereshkin we managed to summarize NVIDIA Offensive Security Research (OSR) work on breaking BMC (reference to our DefCon talk youtube.com/watch?v=dbJQIQ…). This blog post also includes a link to the full paper.


Here's a link to the NVIDIA Data Center Offensive Security Team's research on BMC security resources.nvidia.com/en-us-security… Shoutout to Alex Tereshkin and Adam 'pi3' Zabrocki for this awesome research, and thanks for citing Eclypsium in the footnotes!

Nvidia OSR (Alex Tereshkin, Adam 'pi3' Zabrocki) reveals high-impact Supermicro BMC vulnerabilities (CVE-2024-10237/38/39). Binarly REsearch documenting the details: 👻Ghost in the Controller: Abusing Supermicro BMC Firmware Verification. Read the full story: binarly.io/blog/ghost-in-…


At #NullconBerlin2025, Solar Designer will walk us through the journey from LKRG’s edgy debut to its 1.0 release – complete with real-world attacks, trade-offs, nasty bugs, & some honest truths about kernel hardening. Know More: nullcon.net/berlin-2025/sp… #LKRG #LinuxSecurity



Turns out that Phrack Zine coins for authors are actually pretty cool :) Cc: Richard Johnson


Phrack on MainStage at #defcon33 at noon! Adam 'pi3' Zabrocki chompie Richard Johnson Battle Programmer Yuu



Linux Kernel Runtime Guard LKRG 1.0.0 by Adam 'pi3' Zabrocki Solar Designer Sultan Alsawaf et al. is out, adds support for Linux 6.13+ (tested to 6.17-rc4), forward-edge CFI (Intel CET IBT, KCFI), ..., reduces performance overhead, shrinks the codebase by ~2500 lines. openwall.com/lists/announce…


Did you miss our DEF CON panel this year? It's hacker history storytime hosted by Richard Johnson Battle Programmer Yuu chompie with special guests! Check it out: youtube.com/watch?v=TW-D1I…

We've just published the slides of Solar Designer's @Nullcon Berlin 2025 talk "Linux Kernel Runtime Guard (LKRG) 1.0" openwall.com/lists/announce… #LKRG #nullconBerlin2025 #nullcon

