Eduardo Vela (@sirdarckcat) 's Twitter Profile
Eduardo Vela

@sirdarckcat

not mad. mentally divergent.

personal profile, opinions my own. everything I say is probably wrong.

🐘 @[email protected]

ID: 11855992

linkhttps://bsky.app/profile/sirdarckcat.bsky.social calendar_today04-01-2008 22:08:56

7,7K Tweet

12,12K Followers

594 Following

V4bel (@v4bel) 's Twitter Profile Photo

Google kernelCTF LTS/COS 0-day WIN! Successfully exploited an extremely complex race condition 0-day vuln on two instances without using namespaces 🎉 work with qwerty

Google kernelCTF LTS/COS 0-day WIN!

Successfully exploited an extremely complex race condition 0-day vuln on two instances without using namespaces 🎉

work with <a href="/_qwerty_po/">qwerty</a>
Kav (@kavehrazavi) 's Twitter Profile Photo

In less significant news, we have an open PhD position in COMSEC at ETH. We like low-level hw/sw with a security twist (think CPU/DRAM/RTL/browser/kernel). If you enjoy collaboration and want to see how deep the rabbit hole goes, send us your application! jobs.ethz.ch/job/view/JOPG_…

Rodrigo Branco (@bsdaemon) 's Twitter Profile Photo

Despedida da H2HC! (My goodbye to H2HC!) (English Version Just After the Portuguese) TLDR: Para aqueles que não conseguem ler uma carta longa, estou saindo da organização da H2HC a partir do ano que vem (este ano ainda estarei à frente do evento, como sempre). Todas as

Eduardo Vela (@sirdarckcat) 's Twitter Profile Photo

Back in H2HC last week, Jordy Zomer and me presented this tool we've been working on (with Artem) we now call "🐧 Kernel Explorer". It's still early on, I'll work on FF and a11y next! storage.googleapis.com/kernelctf-dash… storage.googleapis.com/kernelctf-dash… Code is github.com/google/securit…

Tim Willis (@itswillis) 's Twitter Profile Photo

It doesn't happen very often, but Project Zero is hiring! goo.gle/41DBQBY Please share with anyone you think would be awesome for the role 🎉 Looking for at least one person. DMs open if you want to reach out about the role. The team: youtu.be/My_13FXODdU

h0mbre (@h0mbre_) 's Twitter Profile Photo

I tried my hand at exploiting an nday on the Google Container Optimized OS instance in kCTF but sadly was very late to the party. Here is my exploit write-up for it. I learned a lot during the process, let me know what you think. I'll post TL;DR in thread h0mbre.github.io/Patch_Gapping_…

Tavis Ormandy (@taviso) 's Twitter Profile Photo

You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials. bughunters.google.com/blog/542484235…

Royal Hansen (@royalhansen) 's Twitter Profile Photo

Just released: Google awarded nearly $12M to researchers around the world via our Vulnerability Reward Program: security.googleblog.com/2025/03/vulner…

Royal Hansen (@royalhansen) 's Twitter Profile Photo

.Google is sharing details on EntrySign, an AMD Zen microcode signature validation vuln the security team recently discovered: bughunters.google.com/blog/542484235…

the_storm (@the_st0rm) 's Twitter Profile Photo

"Decoding Signal: Understanding the Real Privacy Guarantees of E2EE" I am thrilled to announce that my talk at Black Hat has been accepted. Looking forward to sharing some of my research with everyone 💙🔐 #BHUSA

"Decoding Signal: Understanding the Real Privacy Guarantees of E2EE"
I am thrilled to announce that my talk at <a href="/BlackHatEvents/">Black Hat</a> has been accepted. Looking forward to sharing some of my research with everyone 💙🔐 #BHUSA