Justin Sherman (@jsherma100) 's Twitter Profile
Justin Sherman

@jsherma100

Security reseacher

ID: 1064232000922505216

linkhttps://github.com/jsherman212/ calendar_today18-11-2018 19:00:56

140 Tweet

3,3K Followers

146 Following

Justin Sherman (@jsherma100) 's Twitter Profile Photo

I binged attack on titan this week and nothing I've ever seen even comes close; this show is worth watching just for the masterpiece that's the second half of season 3 alone. Fuckin pumped for the last 2 episodes

Justin Sherman (@jsherma100) 's Twitter Profile Photo

Finally got a cve for this, first cve!!! CVE-2021-30656 and xnuspy will be updated in either a couple days or a couple weeks if 14.5 happened to break it

Justin Sherman (@jsherma100) 's Twitter Profile Photo

Updated Brandon Azad's KTRW for 14.x and wrote patchfinders for the offsets it needs (aka no more hunting for offsets yourself and putting them in a text file, the pongo module will get them automatically) @ github.com/jsherman212/kt…

Updated <a href="/_bazad/">Brandon Azad</a>'s KTRW for 14.x and wrote patchfinders for the offsets it needs (aka no more hunting for offsets yourself and putting them in a text file, the pongo module will get them automatically) @ github.com/jsherman212/kt…
Justin Sherman (@jsherma100) 's Twitter Profile Photo

Appreciate it!! xnuspy update day is never painless but this eases it a lot. Should have official 15.x support done by this weekend or next weekend

Justin Sherman (@jsherma100) 's Twitter Profile Photo

15.0 support for xnuspy is done, and xnuspy_ctl.h now lives inside include/xnuspy/ so I don't have to juggle two copies of enums/macros/constants between kernel/user code. Pls let me know if there's any issues since I only have two phones I was able to update to iOS 15

Justin Sherman (@jsherma100) 's Twitter Profile Photo

This semester I decided to do an independent study, which is a semester-long project that counts for credits like a class would. My project is a kernel exploit for CVE-2021-30807 + a writeup. I just finished the exploit and popped 14.6 and 14.7 on my phones, writeup eta son

This semester I decided to do an independent study, which is a semester-long project that counts for credits like a class would. My project is a kernel exploit for CVE-2021-30807 + a writeup. I just finished the exploit and popped 14.6 and 14.7 on my phones, writeup eta son
Justin Sherman (@jsherma100) 's Twitter Profile Photo

I just updated the part of the writeup about zalloc gc/refill flow to include content about partially-populated chunks. I also fixed something which was incorrect