Francesco Soncina (@phraaaaaaa) 's Twitter Profile
Francesco Soncina

@phraaaaaaa

OSCE // OSCP // Ethical Hacker & Red Teamer // Full Stack Developer // CTF Player @DonkeysTeam

ID: 270009412

linkhttps://iwantmore.pizza/ calendar_today21-03-2011 21:03:20

1,1K Tweet

3,3K Followers

3,3K Following

Wietze (@wietze) 's Twitter Profile Photo

My talk demonstrating how with minor tweaks you can really frustrate command line-based detections across Windows, Linux and MacOS is now live: ⚡ youtube.com/watch?v=52tAmV… Security BSides Dublin #threatdetection #threathunting #lolbas #offsec

My talk demonstrating how with minor tweaks you can really frustrate command line-based detections across Windows, Linux and MacOS is now live: 
⚡ youtube.com/watch?v=52tAmV…

<a href="/BSidesDublin/">Security BSides Dublin</a> #threatdetection #threathunting #lolbas #offsec
Crusaders of Rust (@cor_ctf) 's Twitter Profile Photo

Checkout FizzBuzz101's corCTF 2024 challenge writeups! Leaking Flags from Initramfs with Spectre v1: willsroot.io/2024/08/just-a… KVM Escape from a nested L2 guest to the L1 hypervisor: willsroot.io/2024/08/trojan…

0xor0ne (@0xor0ne) 's Twitter Profile Photo

How to achieve code execution with an Out-of-Bounds Write in Chrome V8 engine (Maglev compiler) blog.exodusintel.com/2024/01/19/goo… Credits Javier Jimenez and Vignesh Rao #chrome #cybersecurity

How to achieve code execution with an Out-of-Bounds Write in Chrome V8 engine (Maglev compiler)

blog.exodusintel.com/2024/01/19/goo…

Credits Javier Jimenez and Vignesh Rao

#chrome #cybersecurity
Meysam (@r00tkitsmm) 's Twitter Profile Photo

Paper day 1- EXPRACE: Exploiting Kernel Races through Raising Interrupts usenix.org/system/files/s… and 2- Racing against the clock -- hitting a tiny kernel race window ( this is really cool) googleprojectzero.blogspot.com/2022/03/racing…

LaurieWired (@lauriewired) 's Twitter Profile Photo

We're not talking about espionage. This new LaurieWired video is about Inter-process communication. (ok, it's also about espionage, but only because it's a great analogy) youtu.be/Fb4UoqXPEtI?si…

Ryan M (@grimdoomer) 's Twitter Profile Photo

Here’s a blog post covering all the technical details behind a strcpy bug I found in the Tony Hawk video game series that can be used to hack several gaming consoles and even get RCE on the over the network icode4.coffee/?p=954

Michael Schwarz (@misc0110) 's Twitter Profile Photo

With the #GhostWrite CPU vulnerability, all isolation boundaries are broken - sandbox/container/VM can't prevent GhostWrite from writing and reading arbitrary physical memory on affected RISC-V CPUs. Deterministic, fast, and reliable - no side channels. ghostwriteattack.com

With the #GhostWrite CPU vulnerability, all isolation boundaries are broken - sandbox/container/VM can't prevent GhostWrite from writing and reading arbitrary physical memory on affected RISC-V CPUs. Deterministic, fast, and reliable - no side channels. ghostwriteattack.com
klez (@klezvirus) 's Twitter Profile Photo

[RELEASE] Following the talk at DEF CON, I'm releasing all the POC projects associated with DriverJack. More info in the repos. For any additional info, hit me up ;) - github.com/klezVirus/Driv… - github.com/klezVirus/RpcP… - github.com/klezVirus/kopp…

Andrea Pierini (@decoder_it) 's Twitter Profile Photo

In the UPDATE section of my post decoder.cloud/2024/04/24/hel…, I explained why you won't find my acknowledgment for CVE-2024-38061 any more.

Hossein Lotfi (@hosselot) 's Twitter Profile Photo

Google Chrome In-The-Wild Type Confusion in V8 (CVE-2024-7971 [360700873]) happens when handling loop inputs inside WASM baseline (A.K.A Liftoff) compiler/assembler: chromium-review.googlesource.com/c/v8/v8/+/5797…

Josh (@passthehashbrwn) 's Twitter Profile Photo

New blog from me on manually manipulating Vectored Exception Handlers to evade some EDRs and perform threadless process injection. securityintelligence.com/x-force/using-… Accompanying code: github.com/xforcered/Vect…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

In part 3 of his series on exploiting #Exchange #Powershell after ProxyNotShell, ZDI researcher Piotr Bazydło chains 3 bugs that lead to RCE, mainly by abusing the single-argument constructor conversions. Read the details at zerodayinitiative.com/blog/2024/9/18…

Diego Capriotti (@naksyn) 's Twitter Profile Photo

This has been one of my favorites for a while, but now it's time to let it go. Here's my preferred way of getting the KeePass db that we often hunt for: downgrade the executable to version 2.53, use CVE-2023-24055 and wait for the busy admin to trigger the dump of the database.

Alisa Esage Шевченко (@alisaesage) 's Twitter Profile Photo

Releasing full 2+hr video of my browser exploitation workshop from VXCON 2024: youtube.com/live/b9OhamkAY… In which I show what goes inside the mind of a skilled hacker while exploiting a highly non-trivial vulnerability in v8, from zero to exploit concept. Especially this workflow

blueblue (@piedpiper1616) 's Twitter Profile Photo

GitHub - TheN00bBuilder/cve-2024-11477-writeup: CVE-2024-11477 7Zip Code Execution Writeup and Analysis - github.com/TheN00bBuilder…

Jeffrey Scholz (@jeyffre) 's Twitter Profile Photo

I read Google's paper about their quantum computer so you don't have to. They claim to have ran a quantum computation in 5 minutes that would take a normal computer 10^25 years. But what was that computation? Does it live up to the hype? I will break it down.🧵

Rad (@rad9800) 's Twitter Profile Photo

Another approach to disable EDRs (with anti-tampering). Credit goes to sixtyvividtails for the idea🧙‍♂️ PendingFileRenameOperations and an NTFS junction, we can ask Windows to delete EDR binaries on reboot (with Admin privs) A link to a complete GitHub PoC follows in replies

Another approach to disable EDRs (with anti-tampering). Credit goes to <a href="/sixtyvividtails/">sixtyvividtails</a> for the idea🧙‍♂️

PendingFileRenameOperations and an NTFS junction, we can ask Windows to delete EDR binaries on reboot (with Admin privs)

 A link to a complete GitHub PoC follows in replies
Samuel Groß (@5aelo) 's Twitter Profile Photo

We released our Fuzzilli-based V8 Sandbox fuzzer: github.com/googleprojectz… It explores the heap to find interesting objects and corrupts them in a deterministic way using V8's memory corruption API. Happy fuzzing!