Ziyi Guo (@kitahara_triple) 's Twitter Profile
Ziyi Guo

@kitahara_triple

CS Ph.D. Student @NorthwesternU / 42-b3yond-6ug #aixcc / CTFer @r3kapig / Cyber Security, LLM agent for Security

ID: 1199288268530913281

calendar_today26-11-2019 11:26:26

93 Tweet

470 Takipçi

181 Takip Edilen

Qualys (@qualys) 's Twitter Profile Photo

The award-winning Qualys Threat Research Unit (TRU) has discovered a critical vulnerability in OpenSSH, designated CVE-2024-6387 and aptly named "regreSSHion." This Remote Code Execution bug grants full root access, posing a significant exploitation risk. blog.qualys.com/vulnerabilitie…

Dan Guido (@dguido) 's Twitter Profile Photo

42-b3yond-6ug had a strong performance overnight, being the sole team to find a Linux Kernel bug and the first to identify and patch a Jenkins bug. They're now tied with Buttercup for total achievements.

42-b3yond-6ug had a strong performance overnight, being the sole team to find a Linux Kernel bug and the first to identify and patch a Jenkins bug.

They're now tied with Buttercup for total achievements.
DARPA (@darpa) 's Twitter Profile Photo

AI Cyber Challenge Semifinal Competition results are in! Congratulations to the top seven scoring teams who will advance to finals, and to all the competitors who worked to help safeguard the code that underpins critical infrastructure. More: darpa.mil/news-events/20…

AI Cyber Challenge Semifinal Competition results are in! Congratulations to the top seven scoring teams who will advance to finals, and to all the competitors who worked to help safeguard the code that underpins critical infrastructure. More: darpa.mil/news-events/20…
Northwestern University Computer Science (@northwesterncs) 's Twitter Profile Photo

Team 42-b3yond-6ug - led by Northwestern Engineering's Xinyu Xing and Yan Chen - was among the top seven scoring teams at the DARPA and ARPA-H #AIxCC semifinal competition! They will advance to the final competition in August 2025. Congratulations! spr.ly/6012WDs1y

Linux Kernel Security (@linkersec) 's Twitter Profile Photo

GPUAF: Using a general GPU exploit tech to attack Pixel 8 A talk by @peterpan980927 and Billy about leveraging an integer overflow bug in the Mali GPU driver to gain use-after-free access to physical pages and escalate privileges on Pixel 8. youtube.com/watch?v=Mw6iCq…

GPUAF: Using a general GPU exploit tech to attack Pixel 8

A talk by @peterpan980927 and <a href="/st424204/">Billy</a> about leveraging an integer overflow bug in the Mali GPU driver to gain use-after-free access to physical pages and escalate privileges on Pixel 8.

youtube.com/watch?v=Mw6iCq…
USENIX WOOT Conference on Offensive Technologies (@wootsecurity) 's Twitter Profile Photo

USENIX WOOT Conference on Offensive Technologies 2025 (WOOT '25) CFP is online! Deadlines: - Up-and-coming track: March 4th, 2025 - Academic track: March 11, 2025 usenix.org/conference/woo…

Linux Kernel Security (@linkersec) 's Twitter Profile Photo

CVE-2023-52927 - Turning a Forgotten Syzkaller Report into kCTF Exploit Article by Hoàng Hải Long 🇻🇳 about finding an unfixed netfilter use-after-free bug reported by syzbot. The researcher exploited it to pwn the kernelCTF COS instance. seadragnol.github.io/posts/CVE-2023…

CVE-2023-52927 - Turning a Forgotten Syzkaller Report into kCTF Exploit

Article by <a href="/seadragnol/">Hoàng Hải Long 🇻🇳</a> about finding an unfixed netfilter use-after-free bug reported by syzbot. The researcher exploited it to pwn the kernelCTF COS instance.

seadragnol.github.io/posts/CVE-2023…