Michael Stepankin (@artsploit) 's Twitter Profile
Michael Stepankin

@artsploit

Security Researcher at @GHSecurityLab

ID: 2605427065

linkhttp://artsploit.blogspot.com/ calendar_today05-07-2014 12:30:16

293 Tweet

6,6K Followers

571 Following

GitHub Security Lab (@ghsecuritylab) 's Twitter Profile Photo

If you're at #BHUSA, don't miss Michael Stepankin 's presentation mTLS: When Certificate Authentication is Done Wrong at 2:30pm, to learn about some novel attacks on mTLS authentication blackhat.com/us-23/briefing…

Kev (@kevin_backhouse) 's Twitter Profile Photo

Video of my PoC for CVE-2023-43641: out-of-bounds array access in libcue. libcue is used by tracker-miners, which automatically scans new files in ~/Downloads, so the bug is triggered by downloading a file.

Man Yue Mo (@mmolgtm) 's Twitter Profile Photo

In this post I'll use CVE-2023-4069, a type confusion bug in the Maglev JIT compiler of Chrome that I reported in July, to gain RCE in the Chrome renderer sandbox: github.blog/2023-10-17-get…

shubs (@infosec_au) 's Twitter Profile Photo

The SSRF/auth bypass affecting Ivanti Pulse Connect Secure (CVE-2024-21893), is a great example of what can be achieved with a fully blind SSRF vulnerability (RCE). Read the Assetnote blog here which includes a reliable payload and generation steps: assetnote.io/resources/rese…

Man Yue Mo (@mmolgtm) 's Twitter Profile Photo

In this post I'll use CVE-2023-6241, a vulnerability in the Arm Mali GPU that I reported last November to gain arbitrary kernel code execution from an untrusted app on a Pixel 8 with MTE enabled. github.blog/2024-03-18-gai…

Charles Fol (@cfreal_) 's Twitter Profile Photo

The first part of the blog series: #Iconv, set the charset to RCE. We'll use #PHP filters and #CVE-2024-2961 to get a very stable code execution exploit from a file read primitive. #cnext

GitHub Security Lab (@ghsecuritylab) 's Twitter Profile Photo

🚨 New Blog Alert! 🚨 Can an attacker execute commands by sending JSON? Learn how unsafe deserialization vulnerabilities in Ruby can be exploited and how they can be detected with CodeQL. 🔗 Read the full post: github.blog/2024-06-20-exe… Stay safe and code responsibly! 🛡️💻

Source Incite (@sourceincite) 's Twitter Profile Photo

Time to retire some content! JNDI Injection Remote Code Execution via Path Manipulation in MemoryUserDatabaseFactory: srcincite.io/blog/2024/07/2…

Martin Doyhenard (@tincho_508) 's Twitter Profile Photo

So happy to had the chance to present for second time at #BlackHat USA! I’m already receiving a lot of messages from people using these techniques to get some nice bounties! If you want to learn more about cache exploitation, the research is available at portswigger.net/research/gotta…

Michael Stepankin (@artsploit) 's Twitter Profile Photo

Just submitted a CFP to Ekoparty | Hacking everything where I want to talk about breaking Maven repository managers. This is the one of the craziest and fruitful research projects I've done in my career.

watchTowr (@watchtowrcyber) 's Twitter Profile Photo

The industry is ablaze w speculation around yesterday's publicly disclosed Veeam Software Backup & Replication RCE vulnerabilities (CVE-2025-23120). We reported these vulnerabilities to Veeam in early February, tracked as WT-2025-0014 and WT-2025-0015. labs.watchtowr.com/by-executive-o…