marce (@imarcex_) 's Twitter Profile
marce

@imarcex_

hacking something

ID: 1175322951849299968

linkhttps://zeroclick.sh/ calendar_today21-09-2019 08:17:02

152 Tweet

224 Followers

710 Following

Klecko (@klecko0) 's Twitter Profile Photo

This is what I've been doing for the last few weeks! I'm trying to write a hypervisor-based fuzzer to fuzz linux userspace binaries at native speed while having fast memory resets and code coverage github.com/klecko/kvm-fuzz

HackOn (@hackonurjc) 's Twitter Profile Photo

¡Preparados, listos, apunta la fecha! 📆 La VI edición de #HackOn está a la vuelta de la esquina. Anotad el 22/02/2024 en vuestros calendarios. ¡La cuenta atrás ha comenzado! ⏳ #HackOn2024

¡Preparados, listos, apunta la fecha! 📆 

La VI edición de #HackOn está a la vuelta de la esquina. Anotad el 22/02/2024 en vuestros calendarios. 

¡La cuenta atrás ha comenzado! ⏳ #HackOn2024
HackOn (@hackonurjc) 's Twitter Profile Photo

🚨Confirmamos cuarto taller🚨 Daniel Monzón (stark0de) y Diego Palacios (DiegoAltF4), alumno del grado de Ingeniería de la Ciberseguridad, impartirán un taller utilizando la técnica Fuzzing para el crasheo de programas. 👨‍💻 Gracias por participar en la #HackOn2024.🎉

🚨Confirmamos cuarto taller🚨

Daniel Monzón (<a href="/stark0de1/">stark0de</a>)  y Diego Palacios (<a href="/Diego_AltF4/">DiegoAltF4</a>), alumno del grado de Ingeniería de la Ciberseguridad, impartirán un taller utilizando la técnica Fuzzing para el crasheo de programas. 👨‍💻

Gracias por participar en la #HackOn2024.🎉
HackOn (@hackonurjc) 's Twitter Profile Photo

Empezamos a calentar motores para #HackOn2024 🔥, por eso sorteamos 1 entrada para la /RootedCON de Madrid. Para participar debes: 📝Seguirnos HackOn 🔁RT 🗓️Asistir el día 22 al evento Tienes hasta el día 21 de febrero para participar. ¡Suerte a todos!🍀

maxpl0it (@maxpl0it) 's Twitter Profile Photo

Manfred Paul’s Firefox renderer bug is a beauty that takes advantage of an optimisation implemented just 3 months ago. Let’s break it down!

Zero Day Engineering (@zerodaytraining) 's Twitter Profile Photo

This looks like a candidate for Chrome v8 0day bug used by Manfred Paul in his Pwn2Own 2024 exploit (CVE-2024-2887, just patched in Chrome stable 123.0.6312.86/.87) wasm module decoder had a missing check of type section size in a branch of DecodeTypeSection, easy to spot manually:

This looks like a candidate for Chrome v8 0day bug used by <a href="/_manfp/">Manfred Paul</a> in his Pwn2Own 2024 exploit (CVE-2024-2887, just patched in Chrome stable 123.0.6312.86/.87)

wasm module decoder had a missing check of type section size in a branch of DecodeTypeSection, easy to spot manually:
zeroclick.sh (@zeroclicksh) 's Twitter Profile Photo

Keep calm and Qemu on!! If you want to see how to exploit a vulnerable PCI device and escape from Qemu, take a look at the writeup that DiegoAltF4 and dbd4 have prepared about their HackOn 2024 challenge. zeroclick.sh/posts/quememu-…

zeroclick.sh (@zeroclicksh) 's Twitter Profile Photo

New post is up!! . Tired of not solving FSOP challenges on the latest libc? You don't need to look any further;) Intro to FSOP exploitation and House of Paper by k4kii zeroclick.sh/posts/fsop-int…

New post is up!! . Tired of not solving FSOP challenges on the latest libc? You don't need to look any further;)

Intro to FSOP exploitation and House of Paper by <a href="/pop_rdi_ret/">k4kii</a> 

zeroclick.sh/posts/fsop-int…
zeroclick.sh (@zeroclicksh) 's Twitter Profile Photo

Easy right? Well then here is the writeup for a CTF pwn challenge that requires both linux heap and FSOP exploitation techniques. k4kii is the creator of both the challenge and the write up. zeroclick.sh/posts/la-casa-…

Easy right? Well then here is the writeup for a CTF pwn challenge that requires both linux heap and FSOP exploitation techniques. 

<a href="/pop_rdi_ret/">k4kii</a> is the creator of both the challenge and the write up.

zeroclick.sh/posts/la-casa-…
Zero Day Engineering (@zerodaytraining) 's Twitter Profile Photo

Patch candidate for Chrome v8 Use-after-free to RCE bug (CVE-2024-3914) exploited by Xion at Pwn2Own 2024 Vancouver against both Chrome and Microsoft Edge. Patched in Chrome 124.0.6367.60/.61 This is not "quite" v8 - it's kinda blink reachable from v8. Classic array neutering

Patch candidate for Chrome v8 Use-after-free to RCE bug (CVE-2024-3914) exploited by <a href="/0x10n/">Xion</a> at Pwn2Own 2024 Vancouver against both Chrome and Microsoft Edge. Patched in Chrome 124.0.6367.60/.61

This is not "quite" v8 - it's kinda blink reachable from v8. Classic array neutering
zeroclick.sh (@zeroclicksh) 's Twitter Profile Photo

🚀 New blog alert! 🚀 Dive deep with our latest posts: 🍎 "TCC Overview and Internals" - Learn how one of the main macOS protections work 🐝"Intro to Development Using eBPF" - Start your journey with eBPF and Docker! Hope you enjoy the new content made by Ismael

HackOn (@hackonurjc) 's Twitter Profile Photo

🚨🚨ATENCÓN🚨🚨 #HackOn2025 ya tiene fecha oficial🎉. Por primera vez, el evento tendrá lugar durante dos días: 28 de febrero y 1 de marzo ⏳Próximamente comunicaremos más novedades de esta edición⌛️

🚨🚨ATENCÓN🚨🚨
#HackOn2025 ya tiene fecha oficial🎉. Por primera vez, el evento tendrá lugar durante dos días:
28 de febrero y 1 de marzo

⏳Próximamente comunicaremos más novedades de esta edición⌛️
Klecko (@klecko0) 's Twitter Profile Photo

I've written a post on SELinux and some public bypasses for Android kernel exploitation. It's especially relevant for Samsung and Huawei devices due to their use of hypervisors. Check it out here: klecko.github.io/posts/selinux-…

zeroclick.sh (@zeroclicksh) 's Twitter Profile Photo

🚀 We're back with a fresh blog redesign! Dive into DiegoAltF4's latest post, which offers an in-depth analysis of CVE-2023-22098, including a reliable PoC to escape VirtualBox. 🛠️ Unleash your virtualization magic now! Link below ⬇️

lu.🕊️ (@luucmcho) 's Twitter Profile Photo

me he creado un canal de youtube donde subo vlogs, charlitas y demás :) os agradecería mucho que le dierais amor🤍 link abajo

Doyensec (@doyensec) 's Twitter Profile Photo

We'd like to welcome our newest addition Marcelino Siles Rubia (marce)! Another success story from our #internship program! The future of #appsec is looking bright 😎 at #doyensec!

We'd like to welcome our newest addition Marcelino Siles Rubia (<a href="/imarcex_/">marce</a>)! Another success story from our #internship program! The future of #appsec is looking bright 😎 at #doyensec!