pwnfl4k3s (@pwnfl4k3s) 's Twitter Profile
pwnfl4k3s

@pwnfl4k3s

Opcode Kiddy a.k.a. [email protected]

ID: 2741760594

calendar_today18-08-2014 10:01:19

151 Tweet

827 Followers

558 Following

Andrea Biondo (@anbiondo) 's Twitter Profile Photo

Full writeup on exploiting stephen's Math.expm1 typing bug in V8, from analysis of the bug to RCE. Definitely one of the most difficult bugs I've ever worked on. Enjoy! abiondo.me/2019/01/02/exp…

Brendan Dolan-Gavitt (@moyix) 's Twitter Profile Photo

It looks like the code for Neuzz, a very cool new approach to fuzzing that uses deep neural networks to predict the coverage map for an input and then uses its gradients to focus fuzzing effort, has been released! github.com/Dongdongshe/ne…

WithSecure Labs (@fsecurelabs) 's Twitter Profile Photo

Did you recently think what the fuzz is this fuzzing everyone's talking about? Here's a thorough introduction to fuzzing by Felix labs.mwrinfosecurity.com/blog/what-the-…

Jeremy Fetiveau (@__x86) 's Twitter Profile Photo

Here is my exploit for one of stephen 's TurboFan bugs related to an incorrect typing of String.(last)IndexOf JSCall nodes. github.com/JeremyFetiveau…

Dominik Herrmann (@herdom) 's Twitter Profile Photo

Join us in Bamberg to discuss about Ethics, IT Security, and Privacy (March 25–26). 13 speakers, 7 sessions, full program and registration (extended until March 11) at bamberg.canvas-project.eu

Join us in Bamberg to discuss about Ethics, IT Security, and Privacy (March 25–26). 13 speakers, 7 sessions, full program and registration (extended until March 11) at bamberg.canvas-project.eu
Samuel Groß (@5aelo) 's Twitter Profile Photo

Fuzzilli, my JavaScript engine fuzzer, is now open source: github.com/googleprojectz… \o/ Keep an eye on the Project Zero bugtracker in the next few weeks for some of the bugs found with it. Also let me know if you encounter any problems when using it! :)

Andy Nguyen (@theflow0) 's Twitter Profile Photo

I have finally published a write-up of the Trinity exploit chain consisting of three stages and six different vulnerabilities! theofficialflow.github.io/2019/06/18/tri…

I have finally published a write-up of the Trinity exploit chain consisting of three stages and six different vulnerabilities! theofficialflow.github.io/2019/06/18/tri…
WithSecure Labs (@fsecurelabs) 's Twitter Profile Photo

Ever wanted to hack a car? Break out of a hypervisor? Get over the air remote code execution on a baseband? MWR is looking for an offensive security researcher. careers.mwrinfosecurity.com/Jobs/Advert/16… #0day #pwn2own

Ever wanted to hack a car? Break out of a hypervisor? Get over the air remote code execution on a baseband? MWR is looking for an offensive security researcher. careers.mwrinfosecurity.com/Jobs/Advert/16… #0day #pwn2own
James Loureiro (@nerdkernel) 's Twitter Profile Photo

The mwrlabs team demonstrated 9 bugs in our inaugural internal pwn2own - showing remote and local bugs in IoT devices and routers. Awesome stuff ☺️

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! The WithSecure Labs crew used an #XSS bug in the NFC component of the #Xiaomi Mi9 to exfiltrate data just by touching their specially made NFC tag. Their efforts earned $30,000 and 3 more Master of Pwn points. #P2OTokyo

WithSecure Labs (@fsecurelabs) 's Twitter Profile Photo

Two security researchers went on a web app test and you won't believe what overflowed next: check out our new blog post "Prince of the Honeycomb" by pwnfl4k3s labs.f-secure.com/blog/prince-of…

WithSecure Labs (@fsecurelabs) 's Twitter Profile Photo

You gotta be kidding Mi - We just published the Xiaomi Pwn2Own 2018 advisories, which were patched just before Pwn2Own 2019, for silent APK install in the Browser and WiFi categories by G. Geshev labs.f-secure.com/advisories/xia… and labs.f-secure.com/advisories/xia…