woetroe (@woetroe2) 's Twitter Profile
woetroe

@woetroe2

Donโ€™t go out of scope | crto

ID: 1248677116109094913

calendar_today10-04-2020 18:20:14

446 Tweet

34 Followers

1,1K Following

Nikolaj Schlej (@nikolajschlej) 's Twitter Profile Photo

Published the third part of my blog series about Hydroph0bia (CVE-2025-4275) vulnerability, this one is about the fix as Insyde applied it, and my thoughts on improvements for it. coderush.me/hydroph0bia-paโ€ฆ

Ch40s ๐Ÿดโ€โ˜ ๏ธ (@drch40s) 's Twitter Profile Photo

Just wrapped up our talk at REcon ! ๐ŸŽคtonvi ๐Ÿš€ My Emulation Goes to the Moon (Until FALSE_FLAG) is now also a blog post: ๐Ÿ“– retooling.io/blog/my-emulatโ€ฆ ๐ŸŽฅ cfp.recon.cx/recon-2025/talโ€ฆ #recon2025 #reverseengineering #emulation

Hacksparo ๐Ÿฅท๐Ÿ‘พ (@hack_sparo) 's Twitter Profile Photo

Weโ€™re cooked, guys. A new vulnerability has been discovered in sudo and you donโ€™t even need to be in the sudo group to get root. I just tried it ๐Ÿ‘‡

winterknife ๐ŸŒป (@_winterknife_) 's Twitter Profile Photo

Wintel is coming for your SMEP bypasses! No more flipping the U/S bit in a PTE to mark a user-mode page as supervisor-mode on Intel Arrow Lake CPUs :) (note: this is meant for protection against speculative attacks, with the side effect of becoming SMEP 2.0)

Wintel is coming for your SMEP bypasses!
No more flipping the U/S bit in a PTE to mark a user-mode page as supervisor-mode on Intel Arrow Lake CPUs :)
(note: this is meant for protection against speculative attacks, with the side effect of becoming SMEP 2.0)
d3d aka dead (dead, ะผั‘ั€ั‚ะฒ, ๆญปไบ†) (@deadvolvo) 's Twitter Profile Photo

blog.malicious.group/the-quiet-sideโ€ฆ This is a living document at the moment, but here it is for now. ๐Ÿ˜…As mentioned in the paper, if you are a researcher and have questions after reading, just reach out to me and I will answer everything I can.

Tijme Gommers (@tijme) 's Twitter Profile Photo

Exciting times. I'm publishing Dittobytes today after presenting it at OrangeCon ! Dittobytes is a true metamorphic cross-compiler aimed at evasion. Use Dittobytes to compile your malware. Each compilation produces unique, functional shellcode. github.com/tijme/dittobytโ€ฆ

RedDrip Team (@reddrip7) 's Twitter Profile Photo

Analysis of Windows CLFS #EoP vuln (#CVE-2025-29824) in-the-wild exploitation sample and root cause Report: ti.qianxin.com/blog/articles/โ€ฆ ITW sample: virustotal.com/gui/file/808cbโ€ฆ

Analysis of Windows CLFS #EoP vuln (#CVE-2025-29824) in-the-wild exploitation sample and root cause

Report: ti.qianxin.com/blog/articles/โ€ฆ

ITW sample: virustotal.com/gui/file/808cbโ€ฆ
Dirk-jan (@_dirkjan) 's Twitter Profile Photo

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-globโ€ฆ

Hunt.io (@huntio) 's Twitter Profile Photo

๐Ÿ”ด ๐—ก๐—ฒ๐˜„ ๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต: ๐—›๐˜‚๐—ป๐˜๐—ถ๐—ป๐—ด ๐—”๐—ฑ๐—ฎ๐—ฝ๐˜๐—ถ๐˜…๐—–๐Ÿฎ โ€“ ๐—ง๐—ฟ๐—ฎ๐—ฐ๐—ถ๐—ป๐—ด ๐—ผ๐˜ƒ๐—ฒ๐—ฟ ๐Ÿญ๐Ÿฌ๐Ÿฌ ๐—Ÿ๐—ถ๐˜ƒ๐—ฒ ๐—–๐Ÿฎ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ๐˜€ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐—ช๐—ถ๐—น๐—ฑ Our team investigated AdaptixC2, an open-source command and control framework thatโ€™s being used in real attacks. Using HuntSQLโ„ข,

๐Ÿ”ด ๐—ก๐—ฒ๐˜„ ๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต:  ๐—›๐˜‚๐—ป๐˜๐—ถ๐—ป๐—ด ๐—”๐—ฑ๐—ฎ๐—ฝ๐˜๐—ถ๐˜…๐—–๐Ÿฎ โ€“ ๐—ง๐—ฟ๐—ฎ๐—ฐ๐—ถ๐—ป๐—ด ๐—ผ๐˜ƒ๐—ฒ๐—ฟ ๐Ÿญ๐Ÿฌ๐Ÿฌ ๐—Ÿ๐—ถ๐˜ƒ๐—ฒ ๐—–๐Ÿฎ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ๐˜€ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐—ช๐—ถ๐—น๐—ฑ

Our team investigated AdaptixC2, an open-source command and control framework thatโ€™s being used in real attacks.

Using HuntSQLโ„ข,
Lukasz Olejnik (@lukolejnik) 's Twitter Profile Photo

Chinese authorities allege a 27-month NSA operation against the China's National Time Service Center. Initial credential theft apparently via a smartphone-messaging exploit. They relese technical details, including information about 80+ remote logins between April 11 and August

Chinese authorities allege a 27-month NSA operation against the China's National Time Service Center. Initial credential theft apparently via a smartphone-messaging exploit. They relese technical details, including information about 80+ remote logins between April 11 and August
SpecterOps (@specterops) 's Twitter Profile Photo

Credential Guard was supposed to end credential dumping. It didn't. Valdemar Carรธe just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more โคต๏ธ ghst.ly/4qtl2rm

OpenAI (@openai) 's Twitter Profile Photo

Now in private beta: Aardvark, an agent that finds and fixes security bugs using GPT-5. openai.com/index/introducโ€ฆ

Now in private beta: Aardvark, an agent that finds and fixes security bugs using GPT-5.

openai.com/index/introducโ€ฆ
klez (@klezvirus) 's Twitter Profile Photo

[RELEASE] As promised, Iโ€™m releasing the first blog post in a series. It covers the gaps still present in current stack-based telemetry and how Moonwalking can be extended to evade detection logic and reach โ€œon-execโ€ memory encryption. Enjoy ;) klezvirus.github.io/posts/Moonwalkโ€ฆ

Ivan Kwiatkowski (@justicerage) 's Twitter Profile Photo

I've been working on a side project for some time: autonomous reverse-engineering powered by Gepetto. I shared some thoughts here (blog.kwiatkowski.fr/gepetto-web), and am looking for beta testers to try out the platform. DM me or reply below if you are interested!

Lab (@labguy94) 's Twitter Profile Photo

github.com/LabGuy94/CopyMโ€ฆ readcc.net/posts/copymywrโ€ฆ Released my POC which earned me a 3000$ bug bounty.

Faith ๐Ÿ‡ง๐Ÿ‡ฉ๐Ÿ‡ฆ๐Ÿ‡บ (@farazsth98) 's Twitter Profile Photo

I'm excited to finally share Chronomaly, a kernel exploit for Android and Linux kernels 5.10.x using CVE-2025-38352. As a reminder, please patch your Android devices if you haven't already! I recommend getting some ๐Ÿฟ before reading this post ๐Ÿ‘€ All links in the thread below:

I'm excited to finally share Chronomaly, a kernel exploit for Android and Linux kernels 5.10.x using CVE-2025-38352.

As a reminder, please patch your Android devices if you haven't already!

I recommend getting some ๐Ÿฟ before reading this post ๐Ÿ‘€

All links in the thread below: