Adam 'pi3' Zabrocki (@adam_pi3) 's Twitter Profile
Adam 'pi3' Zabrocki

@adam_pi3

Director of Offensive Security @NVIDIA, architecting @RISC_V, @LKRG_org Founder, @BlackHatEvents & @Defcon Speaker, #Phrack author, @PwnieAwards nominee

ID: 3268452193

linkhttp://pi3.com.pl calendar_today04-07-2015 20:28:30

758 Tweet

2,2K Followers

313 Following

confidenceconf (@confidenceconf) 's Twitter Profile Photo

Memory safety issues are still one of the most pervasive challenges in modern computing. Adam Zabrocki will discuss why they matter and present promising solutions like memory-safe languages and hardware-based techniques. Don’t miss it! 🎟️ bit.ly/25thCONFidence

Memory safety issues are still one of the most pervasive challenges in modern computing. Adam Zabrocki will discuss why they matter and present promising solutions like memory-safe languages and hardware-based techniques.

Don’t miss it! 🎟️ bit.ly/25thCONFidence
Alexander Popov (@a13xp0p0v) 's Twitter Profile Photo

Looks like this Timesys is now Lynx! Corporation did an amazing job [SARCASM] selling their Timesys Kernel Hardening Analysis Tool that simply provides the recommendations from my open source project kernel-hardening-checker. They don't even mention kernel-hardening-checker. Shame on them👎

Looks like this <a href="/Timesys/">Timesys is now Lynx!</a> Corporation did an amazing job [SARCASM] selling their Timesys Kernel Hardening Analysis Tool that simply provides the recommendations from my open source project kernel-hardening-checker.

They don't even mention kernel-hardening-checker. Shame on them👎
Adam 'pi3' Zabrocki (@adam_pi3) 's Twitter Profile Photo

Thank you RISC-V International for appreciating my work on improving RISC-V ecosystem, what a nice surprise :) Pointer Masking (HWASAN) is there, HW CFI is there, next step - HW Memory Tagging (MTE) is coming! :)

Thank you <a href="/risc_v/">RISC-V International</a> for appreciating my work on improving RISC-V ecosystem, what a nice surprise :)

Pointer Masking (HWASAN) is there, HW CFI is there, next step - HW Memory Tagging (MTE) is coming! :)
Adam 'pi3' Zabrocki (@adam_pi3) 's Twitter Profile Photo

Together with Alex Tereshkin we managed to summarize NVIDIA Offensive Security Research (OSR) work on breaking BMC (reference to our DefCon talk youtube.com/watch?v=dbJQIQ…). This blog post also includes a link to the full paper.

Gynvael Coldwind (@gynvael.bsky.social) (@gynvael) 's Twitter Profile Photo

[plz RT for range] A soft DEADLINE for article submissions for Issue #7 of Paged Out! has been set: 30 June 2025 We're looking for articles on literally everything that's computer related, technical, and nerdy. As always: 1 page limit :) More info: pagedout.institute

Chase Snyder (@chaseinfosec) 's Twitter Profile Photo

Here's a link to the NVIDIA Data Center Offensive Security Team's research on BMC security resources.nvidia.com/en-us-security… Shoutout to Alex Tereshkin and Adam 'pi3' Zabrocki for this awesome research, and thanks for citing Eclypsium in the footnotes!

BINARLY🔬 (@binarly_io) 's Twitter Profile Photo

Nvidia OSR (Alex Tereshkin, Adam 'pi3' Zabrocki) reveals high-impact Supermicro BMC vulnerabilities (CVE-2024-10237/38/39). Binarly REsearch documenting the details: 👻Ghost in the Controller: Abusing Supermicro BMC Firmware Verification. Read the full story: binarly.io/blog/ghost-in-…

Adam 'pi3' Zabrocki (@adam_pi3) 's Twitter Profile Photo

Forgot to mentioned that our talk "How to secure unique ecosystem shipping 1 billion+ cores?" has been accepted to DEF CON #defcon33 as well! defcon.org/html/defcon-33…

NULLCON (@nullcon) 's Twitter Profile Photo

At #NullconBerlin2025, Solar Designer will walk us through the journey from LKRG’s edgy debut to its 1.0 release – complete with real-world attacks, trade-offs, nasty bugs, & some honest truths about kernel hardening. Know More: nullcon.net/berlin-2025/sp… #LKRG #LinuxSecurity

At #NullconBerlin2025, <a href="/solardiz/">Solar Designer</a> will walk us through the journey from LKRG’s edgy debut to its 1.0 release – complete with real-world attacks, trade-offs, nasty bugs, &amp; some honest truths about kernel hardening.

Know More: nullcon.net/berlin-2025/sp…

#LKRG #LinuxSecurity
CIQ (@ctrliq) 's Twitter Profile Photo

What happens when attackers reach your Linux kernel? The Linux Kernel Runtime Guard (LKRG) continuously monitors kernel integrity in real-time, detecting exploits as they happen - including zero-days that other security measures miss. Key features: • Runtime integrity

What happens when attackers reach your Linux kernel?

The Linux Kernel Runtime Guard (LKRG) continuously monitors kernel integrity in real-time, detecting exploits as they happen - including zero-days that other security measures miss.

Key features: 
• Runtime integrity
Openwall (@openwall) 's Twitter Profile Photo

Linux Kernel Runtime Guard LKRG 1.0.0 by Adam 'pi3' Zabrocki Solar Designer Sultan Alsawaf et al. is out, adds support for Linux 6.13+ (tested to 6.17-rc4), forward-edge CFI (Intel CET IBT, KCFI), ..., reduces performance overhead, shrinks the codebase by ~2500 lines. openwall.com/lists/announce…

Openwall (@openwall) 's Twitter Profile Photo

We've just published the slides of Solar Designer's @Nullcon Berlin 2025 talk "Linux Kernel Runtime Guard (LKRG) 1.0" openwall.com/lists/announce… #LKRG #nullconBerlin2025 #nullcon

We've just published the slides of <a href="/solardiz/">Solar Designer</a>'s @Nullcon Berlin 2025 talk "Linux Kernel Runtime Guard (LKRG) 1.0" openwall.com/lists/announce… #LKRG #nullconBerlin2025 #nullcon