Ikaring0 (@ikaring0_sec) 's Twitter Profile
Ikaring0

@ikaring0_sec

Security Hobbyist

ID: 1159075378780000261

calendar_today07-08-2019 12:14:39

277 Tweet

32 Followers

618 Following

Samuel Groß (@5aelo) 's Twitter Profile Photo

Thanks to events like Pwn2Own or our V8CTF (~= exploit bounty program), we now have more data about the types of bugs exploited in V8. Based on that, we've gathered some basic statistics: docs.google.com/document/d/1nj…

PT SWARM (@ptswarm) 's Twitter Profile Photo

🔥 Last barrier destroyed: The compromise of Fuse Encryption Key in Intel CPUs! Full story by our researcher Mark Ermolov swarm.ptsecurity.com/last-barrier-d…

🔥 Last barrier destroyed: The compromise of Fuse Encryption Key in Intel CPUs!

Full story by our researcher <a href="/_markel___/">Mark Ermolov</a>

swarm.ptsecurity.com/last-barrier-d…
eversinc33 🤍🔪⋆。˚ ⋆ (@eversinc33) 's Twitter Profile Photo

Sunday project: Running a virtual machine in an OpenCL kernel/shader to execute arbitrary code on the GPU. API calls and host memory R/W still has to trap into the CPU of course, but a fun exercise in GPU malware :3

Sunday project: Running a virtual machine in an OpenCL kernel/shader to execute arbitrary code on the GPU. 

API calls and host memory R/W still has to trap into the CPU of course, but a fun exercise in GPU malware :3
V4bel (@v4bel) 's Twitter Profile Photo

qwerty and I exploited a VSock 1-day in Google kernelCTF back in *February*, securing $71,337 🥳 (CVE-2025-21756, exp237/exp249) And I’ve just published the write-up: github.com/google/securit… A kernel developer reviewing a patch for a separate VSock bug I submitted

ϻг_ϻε (@steventseeley) 's Twitter Profile Photo

Nice blog post! I remember using a non-network exploit chain that was custom to VMWare for the pgsql jdbc attack :-> github.com/sourceincite/h…

Chris King (@raikiasec) 's Twitter Profile Photo

Fun fact: I will have an entry-level pentester opening on my team posted within the week. Come join the Mandiant Red Team! I'll post the link once it's public.

ZeroZenX (@zerozenxlabs) 's Twitter Profile Photo

🔥 $400K for Chrome 0day – RCE & V8 Sandbox Bypass Wanted We’re actively acquiring high-value 0day vulnerabilities targeting Google Chrome, with payouts up to $400,000. 🎯 Targets of Interest - Chrome RCE (Remote Code Execution) — $400,000 - Chrome V8 Sandbox Escape / Bypass —

William Burgess (@joehowwolf) 's Twitter Profile Photo

[BLOG] Dynamically Instrumenting Beacon with BeaconGate - For All Your Call Stack Spoofing Needs! cobaltstrike.com/blog/instrumen…

Open Source Security mailing list (@oss_security) 's Twitter Profile Photo

5 CVEs in libxml2 openwall.com/lists/oss-secu… CVE-2025-49794: Heap UAF DoS CVE-2025-49795: Null pointer dereference DoS CVE-2025-49796: Type confusion DoS CVE-2025-6021: Integer and Buffer Overflow in xmlBuildQName() CVE-2025-6170: Stack-based Buffer Overflow in xmllint Shell

PT SWARM (@ptswarm) 's Twitter Profile Photo

🔥 Microsoft fixed CVE-2025-47955, discovered by our researcher Sergey Bliznyuk! This vulnerability allows a locally authenticated attacker to elevate privileges to SYSTEM via the Windows RasMan service. 🔗 Advisory: msrc.microsoft.com/update-guide/e…

kmkz (@kmkz_security) 's Twitter Profile Photo

Toolkit to turn Chromium vulnerabilities into full-chain exploits 👇🏻 github.com/Petitoto/chrom… #bsidesLuxembourg #offensiveOps

xvonfers (@xvonfers) 's Twitter Profile Photo

A toolkit to turn Chromium vulnerabilities into full-chain exploits github.com/Petitoto/chrom… From BSidesLuxembourg 2025 "Browser Exploitation: From N-Days to Real-World Exploit Chains in Google Chrome" pretalx.com/bsidesluxembou…

Mr. OS (@ksg93rd) 's Twitter Profile Photo

#reversing Windows Inter Process Communication: A Deep Dive Beyond the Surface Part 1 - IPC Roadmap - sud0ru.ghost.io/windows-inter-… Part 2 - RPC Architecture Overview - sud0ru.ghost.io/windows-inter-… Part 3 - Handles and binding - sud0ru.ghost.io/windows-inter-… Part 4 - RPC Security -

Stephen Sims (@steph3nsims) 's Twitter Profile Photo

Join me this Friday at 11AM on the next Off By One Security stream where I will diff a Microsoft patch from this year and see how far we get. We'll use tools like BinDiff and Diaphora and look at the process of determining the vulnerability. youtube.com/watch?v=_ZrHjo…