
ASI
@x_x10o9
Vulnerability Researcher (IOS & Linux) —- Interested in Hardware Reversing. Opinions are my own. Actively looking for Opportunities
ID: 1231613949210234882
23-02-2020 16:17:09
1,1K Tweet
165 Followers
822 Following



Inspired by Stephen Sims , I decided to dig into🛡️Windows Defender Exploit Guard myself. Here is the Part-1 of "Reversing Exploit Guard" series, where I break down how it hooks critical functions and defends against stack pivoting. mrt4ntr4.github.io/Exploit-Guard-…




[#Zer0Con2025] - SPEAKER 🔟 💁♂️Manfred Paul - PAC2Own: From Bug to Shellcode in modern Safari
![POC_Crew 👨👩👦👦 (@poc_crew) on Twitter photo [#Zer0Con2025] - SPEAKER 🔟
💁♂️<a href="/_manfp/">Manfred Paul</a> - PAC2Own: From Bug to Shellcode in modern Safari [#Zer0Con2025] - SPEAKER 🔟
💁♂️<a href="/_manfp/">Manfred Paul</a> - PAC2Own: From Bug to Shellcode in modern Safari](https://pbs.twimg.com/media/Gl-77ZCWIAAnw32.jpg)








Slides and fuzzer code from the Fuzzing Linux kernel modules stream are now live: github.com/sl4v/hfsplus-k… Thanks again to Stephen Sims for hosting!


Hoàng Hải Long 🇻🇳, one of our juniors shared his kCTF exploit and the lesson learned: digging through unreproducible Syzkaller reports for gold. qriousec.github.io/post/cve-2023-…


I've discovered via code review: 2 zero-click RCE logic bugs in Linux kernel Bluetooth & userspace (late 2024). Exploitable to register rogue HID w/o auth. One allows bonding w/o confirmation, bypassing CVE-2023-45866 Marc Newlin patch. Details: ubuntu.com/security/CVE-2…
