Hardik Shah (@hardik05) 's Twitter Profile
Hardik Shah

@hardik05

Principal Security Researcher - Tweets and opinions are my own and not of my employer. #fuzzing #trainings #security YouTube: youtube.com/@MrHardik05

ID: 8790062

linkhttp://fuzzing.in/ calendar_today10-09-2007 17:03:59

6,6K Tweet

4,4K Followers

3,3K Following

Pumpkin 🎃 (@u1f383) 's Twitter Profile Photo

A bit late, but I just published my blog post on bypassing Ubuntu’s sandbox! Hope you enjoy it! u1f383.github.io/linux/2025/06/…

Linux Kernel Security (@linkersec) 's Twitter Profile Photo

Bypass Kernel Barriers: Fuzzing Linux Kernel in Userspace With LKL Xuan Xing & Eugene Rodionov Eugene Rodionov gave a talk about fuzzing the Linux kernel interfaces completely in user space using LKL (Linux Kernel Library) static.sched.com/hosted_files/l…

Bypass Kernel Barriers: Fuzzing Linux Kernel in Userspace With LKL

Xuan Xing &amp; Eugene Rodionov <a href="/vxradius/">Eugene Rodionov</a> gave a talk about fuzzing the Linux kernel interfaces completely in user space using LKL (Linux Kernel Library)

static.sched.com/hosted_files/l…
Unit 42 (@unit42_intel) 's Twitter Profile Photo

A far-reaching campaign used JSF*ck as obfuscation to inject malicious JavaScript into more than 270k webpages. The code redirected users to malicious content. We examine how this little-used style relies on type coercion and the campaign's overall aims. bit.ly/4mZ2LjE

A far-reaching campaign used JSF*ck as obfuscation to inject malicious JavaScript into more than 270k webpages. The code redirected users to malicious content. We examine how this little-used style relies on type coercion and the campaign's overall aims. bit.ly/4mZ2LjE
CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by Khoa Dinh to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to Markus Wulftange

We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by <a href="/_l0gg/">Khoa Dinh</a> to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to <a href="/mwulftange/">Markus Wulftange</a>
starlabs (@starlabs_sg) 's Twitter Profile Photo

CASE CLOSED: CVE-2025-29824 0 public samples, 0 information Suspect: Windows CLFS driver Crime: UAF leading to Privilege Escalation Status: ACTIVELY EXPLOITED ITW Investigation: Debugged and documented Case files: starlabs.sg/blog/2025/07-m… Done by our intern, Ong How Chong

xvonfers (@xvonfers) 's Twitter Profile Photo

Whoah... $250000 (CVE-2025-4609, similar to CVE-2025-2783/412578726)[412578726][Mojo][IpczDriver]ipcz bug -> renderer duplicate browser process handle -> escape sbx is now open with PoC & exploit(success rate is nearly 70%-80%) issues.chromium.org/issues/4125787… issues.chromium.org/issues/4125787…

Whoah... $250000

(CVE-2025-4609, similar to CVE-2025-2783/412578726)[412578726][Mojo][IpczDriver]ipcz bug -&gt; renderer duplicate browser process handle -&gt; escape sbx is now open with PoC &amp; exploit(success rate is nearly 70%-80%)
issues.chromium.org/issues/4125787…
issues.chromium.org/issues/4125787…
Chi-en (Ashley) Shen (@ashl3y_shen) 's Twitter Profile Photo

Didn’t get a Phrack zine at DEF CON? Come to HITCON next week! We’re dropping 100 HITCON limited edition copies, with a chance to get Orange Tsai 🍊 ’s autograph. 🍊Walk-in tickets available!

Didn’t get a Phrack zine at <a href="/defcon/">DEF CON</a>?
Come to <a href="/HacksInTaiwan/">HITCON</a> next week! We’re dropping 100 HITCON limited edition copies, with a chance to get <a href="/orange_8361/">Orange Tsai  🍊</a> ’s autograph. 🍊Walk-in tickets available!
Lukasz Olejnik (@lukolejnik) 's Twitter Profile Photo

Chinese scientists have developed the best shortest-path algorithm in 41 years! A team from Tsinghua University has broken Dijkstra’s “sorting barrier” — the first improvement since 1984. The new algorithm runs in O(m \log^{2/3} n) time. Potential applications? Faster shorter

Chinese scientists have developed the best shortest-path algorithm in 41 years! A team from Tsinghua University has broken Dijkstra’s “sorting barrier” — the first improvement since 1984. 
The new algorithm runs in O(m \log^{2/3} n) time. Potential applications? Faster shorter
那个饺子🦆(JJ) (@thatjiaozi) 's Twitter Profile Photo

As promised Blogpost is here! I find that a lot of the times people ask “how can researchers find complex bugs” This is my small contribution to show how the journey looked for me. I presented this content at hitcon last week! bughunters.google.com/blog/580034147…

ϻг_ϻε (@steventseeley) 's Twitter Profile Photo

As it turns out, Orange Tsai 🍊 and I have more in common than I had thought! If you love old school PHP quirks and CTF tricks I recommend you read our articles: phrack.org/issues/72/5_md… phrack.org/issues/72/6_md…