ipwning (@ipwning) 's Twitter Profile
ipwning

@ipwning

@zellic_io Security Engineer | CTF player in @cykorKU & @SuperGuesser | Binary exploit | web3 & 0-day research 🥸

ID: 1101876971758247944

linkhttp://ipwning.com calendar_today02-03-2019 16:08:36

118 Tweet

661 Followers

424 Following

0xor0ne (@0xor0ne) 's Twitter Profile Photo

LPE in Ubuntu (CVE-2023-35001). Pwn2Own Vancouver 2023 Excellent writeup by Tanguy Dubroca (Synacktiv) synacktiv.com/en/publication… #Ubuntu #Linux #exploit

LPE in Ubuntu (CVE-2023-35001). Pwn2Own Vancouver 2023
Excellent writeup by Tanguy Dubroca (<a href="/Synacktiv/">Synacktiv</a>)

synacktiv.com/en/publication…

#Ubuntu #Linux #exploit
Klecko (@klecko0) 's Twitter Profile Photo

I've written a post on SELinux and some public bypasses for Android kernel exploitation. It's especially relevant for Samsung and Huawei devices due to their use of hypervisors. Check it out here: klecko.github.io/posts/selinux-…

CyKor (@cykorku) 's Twitter Profile Photo

We're excited to share our second post!: "[Paper Review] CODE-SMASH: Source-Code Vulnerability Detection Using Siamese and Multi-Level Neural Architecture", written by Jinkyung Bae, who is a member of our club and 3rd year at KU! blog.cykor.kr/2025/04/Paper-…

We're excited to share our second post!: "[Paper Review] CODE-SMASH: Source-Code Vulnerability Detection Using Siamese and Multi-Level Neural Architecture", written by Jinkyung Bae, who is a member of our club and 3rd year at KU!
blog.cykor.kr/2025/04/Paper-…
ipwning (@ipwning) 's Twitter Profile Photo

I wasn't much helpful than I thought but it was great experience! Even it made some motivations. Thanks to all of my teammates!

CyKor (@cykorku) 's Twitter Profile Photo

We just shared two new DEFCON 33 CTF two write-ups on our blog! 🛠 Jinheon Lee (KU, 4th year) wrote about jxl4fun2 (pwn) 🧠 Jimin Jeong (KU, 4th year) covered tinii (rev) Check them out: 🔗 blog.cykor.kr/2025/04/DEFCON… 🔗 blog.cykor.kr/2025/04/DEFCON… #CTF #DEFCON #DEFCON33 #CyKor

We just shared two new DEFCON 33 CTF  two write-ups on our blog!
🛠 Jinheon Lee (KU, 4th year) wrote about jxl4fun2 (pwn)
🧠 Jimin Jeong (KU, 4th year) covered tinii (rev)
Check them out: 
🔗 blog.cykor.kr/2025/04/DEFCON…
🔗 blog.cykor.kr/2025/04/DEFCON…
#CTF #DEFCON #DEFCON33 #CyKor
Crowdfense (@crowdfense) 's Twitter Profile Photo

Read our newest blog-post on CVE-2024-11477, a buffer overflow vulnerability in 7-Zip's ZSTD decompression algorithm; explore the technical details: crowdfense.com/cve-2024-11477…

xvonfers (@xvonfers) 's Twitter Profile Photo

🔥🔥🔥 CVE-2025-0995)[391907159][$55000][wasm]WasmCode "resurrection" using the WasmImportWrapperCache - > JIT allocation UAF is now open with PoC & exploit issues.chromium.org/issues/3919071… Reported by Popax21(Matthias Pleschinger)

🔥🔥🔥
CVE-2025-0995)[391907159][$55000][wasm]WasmCode "resurrection" using the WasmImportWrapperCache - &gt; JIT allocation UAF is now open with PoC &amp; exploit
issues.chromium.org/issues/3919071…

Reported by Popax21(Matthias Pleschinger)
Zellic (@zellic_io) 's Twitter Profile Photo

BLS signatures are everywhere, from Ethereum’s consensus to EigenLayer. But it’s easy to use them wrong. What are BLS signatures? Let’s talk about the right way and the wrong way to use them:

BLS signatures are everywhere, from Ethereum’s consensus to EigenLayer. But it’s easy to use them wrong.

What are BLS signatures? Let’s talk about the right way and the wrong way to use them: