HackSys Team (@hacksysteam) 's Twitter Profile
HackSys Team

@hacksysteam

Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning

ID: 846424062

linkhttp://www.hacksys.io/ calendar_today25-09-2012 23:52:49

10,10K Tweet

10,10K Followers

621 Following

xvonfers (@xvonfers) 's Twitter Profile Photo

Overcoming State: Finding Baseband Vulnerabilities by Fuzzing Layer-2 youtube.com/watch?v=mXijb6… i.blackhat.com/BH-US-24/Prese… Dyon Goos & Marius Muench

Alfie (@alfiecg_dev) 's Twitter Profile Photo

I've just published a new blog post detailing how I developed a deterministic kernel exploit for iOS. Enjoy! alfiecg.uk/2025/03/01/Tri…

Zeyu (Zayne) | @zeyu2001@infosec.exchange (@zeyu2001) 's Twitter Profile Photo

My slides from today's talk about Static Program Analysis. I go into how data flow analysis (like taint propagation in CodeQL) works from first principles - should be digestible with some first-year university maths knowledge zeyu2001.github.io/cam-ib-tech-ta…

starlabs (@starlabs_sg) 's Twitter Profile Photo

STAR Labs Windows Exploitation Challenge Writeup We're happy to announce that Frost solved our recent Windows exploitation challenge & earned a ticket to Off-By-One Conference ! 🎉 Full writeup here: starlabs.sg/blog/2025/03-s… Thank you to everyone who participated!

SSD Secure Disclosure (@securiteam_ssd) 's Twitter Profile Photo

🚨 New advisory was just published! 🚨 An out-of-bounds write vulnerability in the Linux kernel achieves local privilege escalation on Ubuntu 22.04 for active user sessions: ssd-disclosure.com/ssd-advisory-l…

Technologeeks (@technologeeks) 's Twitter Profile Photo

Get unparalleled depth on #Scudo Memory allocator internals - AND a sneak peek at J's surprise new book - technologeeks.com/blog/Scudo/

starlabs (@starlabs_sg) 's Twitter Profile Photo

CimFS: Crashing in memory, Finding SYSTEM! chiefpie dug into Microsoft CimFS, found a sneaky 0-day, and guess what? The fix by Microsoft was just locking the door 🔐on unprivileged users. 😂 Dive into the adventure with us: starlabs.sg/blog/2025/03-c…

Ian Beer (@i41nbeer) 's Twitter Profile Photo

My writeup of the 2023 NSO in-the-wild iOS zero-click BLASTDOOR webp exploit: Blasting Past Webp - googleprojectzero.blogspot.com/2025/03/blasti…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

In our latest MindShaRE blog, renorobert describes how to use Binary Ninja’s MLIL to establish a data flow graph by tracing interactions between a specific memory allocation in order to find UAF bugs. He includes source code so you can, too. zerodayinitiative.com/blog/2025/3/20…

BSidesCanberra (@bsidescbr) 's Twitter Profile Photo

The BSides Canberra 2024 keynote is now available to watch! "The Exploit Development Life Cycle: From Concept to Compromise" – chompie breaks down the art of exploit dev, from that first spark to full pwnage. Missed it live? Watch it now: youtu.be/ce0bXORSMX4

HackSys Team (@hacksysteam) 's Twitter Profile Photo

🚨 Recently Discovered Windows Kernel Vulnerability 🚨 We've published an advisory for a severe Local Privilege Escalation in dxkrnl.sys, which has been patched by Microsoft. 🛡️ CVE-2025-29812 🔗 Complete advisory: hacksys.io/advisories/HI-… 🎥 Demo video: youtu.be/y5urzgTQZN0

Yarden Shafir (@yarden_shafir) 's Twitter Profile Photo

Looks like BlueHat IL talks are online now, so here’s my talk for anyone who wanted to learn about the latest episode of KASLR and couldn’t make it: youtu.be/Dk2rLO2LC6I

REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

TyphoonCon🌪️ is already over, but we enjoyed every minute ! During our talk "Journey To Freedom", we disclosed for the first time the details on the Windows LPE we used at Pwn2Own Vancouver 2024 after escaping from VirtualBox. Slides are already available: reversetactics.com/publications/2…

c0c0n2025 (@_c0c0n_) 's Twitter Profile Photo

3 Day Hand-on Training – Advanced Windows Kernel Exploitation Take a deep dive into Windows kernel internals, Fuzzing, privilege escalation, & advanced exploitation techniques. More details: c0c0n.org #infosec #CyberSecurity #SecurityConference #hacker #exploit

3 Day Hand-on Training – Advanced Windows Kernel Exploitation

Take a deep dive into Windows kernel internals, Fuzzing, privilege escalation, & advanced exploitation techniques. 

More details: c0c0n.org

#infosec #CyberSecurity #SecurityConference #hacker #exploit