Cristofaro Mune (@pulsoid) 's Twitter Profile
Cristofaro Mune

@pulsoid

In between Physics & Computing.
Physics, Fault Injection, TEEs, IoT & anything else challenging my curiosity.
Founder at Raelize (@raelizecom)

ID: 78170423

linkhttp://raelize.com calendar_today29-09-2009 00:42:51

2,2K Tweet

1,1K Followers

752 Following

USENIX WOOT Conference on Offensive Technologies (@wootsecurity) 's Twitter Profile Photo

WOOT 2025 Conference starting in Seattle. The program prepared by Alyssa Milburn and Jiska includes sessions on hardware security, wireless attacks, network security. And tomorrow physical attacks, application security. And Keynote by Falcon Darkstar

WOOT 2025 Conference starting in Seattle.  
The program prepared by <a href="/noopwafel/">Alyssa Milburn</a> and <a href="/naehrdine/">Jiska</a>  includes sessions on hardware security, wireless attacks, network security.
And tomorrow physical attacks, application security.
And Keynote by <a href="/FalconDarkstar/">Falcon Darkstar</a>
Raelize (@raelizecom) 's Twitter Profile Photo

Next week we host an online instance of our BootPwn training with a small group of attendees. This is your chance to experience this training in such an intimate setting! Aug 18-21, 2025 (8:00-12:00 PST) raelize.com/bootpwn/ Reach out here or by email if you are interested!

Raelize (@raelizecom) 's Twitter Profile Photo

In how many ways can you break #secureboot on embedded devices? Explore a wide variety of techniques in our #BootPwn with Cristofaro Mune at #hw_ioNL2025. Understanding principles with a holistic system perspective, is key for unlocking next level attacks. hardwear.io/netherlands-20…

In how many ways can you break #secureboot on embedded devices?

Explore a wide variety of techniques in our #BootPwn with <a href="/pulsoid/">Cristofaro Mune</a> at #hw_ioNL2025. 

Understanding principles with a holistic system perspective, is key for unlocking next level attacks.

hardwear.io/netherlands-20…
Dinesh Shetty (@din3zh) 's Twitter Profile Photo

PoC for bootchain exploit on the Nothing Phone 2a / CMF Phone 1 and possibly other MediaTek devices github.com/R0rt1z2/fenrir #MobileSecurity #DFIR #infosec by Roger

PoC for bootchain exploit on the Nothing Phone 2a / CMF Phone 1 and possibly other MediaTek devices github.com/R0rt1z2/fenrir

#MobileSecurity #DFIR #infosec by <a href="/r0rt1z2/">Roger</a>
joernchen (@joernchen) 's Twitter Profile Photo

Today I have a more serious topic than usual, please consider reposting for reach: My wife and I are urgently looking for a specialist in neuropediatrics or a similar field for our autistic child with a diagnosed, but not further specified, movement disorder [1/3]

Physics In History (@physinhistory) 's Twitter Profile Photo

The measure of greatness in a scientific idea is the extent to which it stimulates thought and opens up new lines of research. - P. A. Dirac

The measure of greatness in a scientific idea is the extent to which it stimulates thought and opens up new lines of research.

- P. A. Dirac
Raelize (@raelizecom) 's Twitter Profile Photo

Our #TAoFI will be at #RomHack2025! 4 days of advanced attacks to: - Build up solid #FI fundamentals, with a methodical approach - Learn an FI methodology - Master instruction corruption - Get PC control in ROM - ... And you get to enjoy Rome ;) romhack.io/training/2025/…

Our #TAoFI will be at #RomHack2025!  

4 days of advanced attacks to: 
- Build up solid #FI fundamentals, with a methodical approach
- Learn an FI methodology 
- Master instruction corruption 
- Get PC control in ROM 
- ...  
And you get to enjoy Rome ;)

romhack.io/training/2025/…
Cooper (@ministraitor) 's Twitter Profile Photo

First post-lunch talk at Out Of The Box Security Conference Bankok goes straight down to the nitty gritty: Why'd You Only Call Me When You're In SMM? Exploiting UEFI SMM Vulnerabilities For Persistent Firmware Implants by the hugely impressive ic3qu33n

First post-lunch talk at <a href="/OOTBconf/">Out Of The Box Security Conference</a> Bankok goes straight down to the nitty gritty: Why'd You Only Call Me When You're In SMM? Exploiting UEFI SMM Vulnerabilities For Persistent Firmware Implants by the hugely impressive <a href="/nikaroxanne/">ic3qu33n</a>
ic3qu33n (@nikaroxanne) 's Twitter Profile Photo

Had such a great experience speaking at Out Of The Box Security Conference earlier today about UEFI & SMM RE/xdev ✨ thank you to the entire team Out Of The Box Security Conference l33tdawg for organizing and for having me as a speaker. 🖤 my talk slidedeck will be made public, link will be shared when that’s up!

Had such a great experience speaking at <a href="/OOTBconf/">Out Of The Box Security Conference</a> earlier today about UEFI &amp; SMM RE/xdev ✨ thank you to the entire team <a href="/OOTBconf/">Out Of The Box Security Conference</a> <a href="/l33tdawg/">l33tdawg</a> for organizing and for having me as a speaker. 🖤 
my talk slidedeck will be made public, link will be shared when that’s up!
sergey bratus (@sergeybratus) 's Twitter Profile Photo

A while ago I taught an Android programming class. If Google's plan to demand government ID from programmers for the privilege of running their programs on Android is realized, I don't think I'll ever teach one again. I wouldn't want to endorse such a platform to the students.

Cristofaro Mune (@pulsoid) 's Twitter Profile Photo

There's a fine line between addressing a market and locking a customer base in. IDA Pro old-timer here (as you may guess) and I have been loving it as anyone in our field. Yet, the new licensing model isn't a fit. Time to evolve.

Cristofaro Mune (@pulsoid) 's Twitter Profile Photo

The best reward a trainer... or, better, in this case, a mentor, can get. This, after a great TAoFI week at #romhack2025. Thanks to all our students for their passion and insights. You made it amazing.

POC_Crew 👨‍👩‍👦‍👦 (@poc_crew) 's Twitter Profile Photo

[POC2025] SPEAKER UPDATE 👥 Xingyu Jin(1ce0ear) & Martijn Bogaard - "Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers" #POC2025

[POC2025] SPEAKER UPDATE

👥 Xingyu Jin(<a href="/1ce0ear/">1ce0ear</a>) &amp; Martijn Bogaard - "Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers"

#POC2025
offensivecon (@offensive_con) 's Twitter Profile Photo

🚨 Save the Date for #offensivecon26 Mark your calendars, spread the word, and stay tuned for when registrations open! 📍 Hilton Berlin 🧠 Trainings: 11–14 May 2026 🎤 Conference: 15–16 May 2026 Visit 🔗offensivecon.org for more details.

🚨 Save the Date for #offensivecon26

Mark your calendars, spread the word, and stay tuned for when registrations open!

📍 Hilton Berlin
🧠 Trainings: 11–14 May 2026
🎤 Conference: 15–16 May 2026

Visit 🔗offensivecon.org for more details.
Perri Adams (@perribus) 's Twitter Profile Photo

Have a Furby 0-day? A Juicero exploit? A bewitched 🪄PoC for some cursed, End-of-Life 👻 product that your friends keep begging you to stop reverse engineering & touch grass? We see you: your real friends are at DistrictCon Junkyard. 9 days to submit your most unhinged bugs!

Have a Furby 0-day? A Juicero exploit? A bewitched 🪄PoC for some cursed, End-of-Life 👻 product that your friends keep begging you to stop reverse engineering &amp; touch grass? 

We see you: your real friends are at <a href="/DistrictCon/">DistrictCon</a> Junkyard. 9 days to submit your most unhinged bugs!
Denis Laskov 🇮🇱 (@it4sec) 's Twitter Profile Photo

Fault injection attacks on microcontrollers: everything you need to know and more. 👨🏽‍🏭📟⚡☠️📤 More details on: LinkedIn: linkedin.com/posts/dlaskov_… Substack: it4sec.substack.com/p/fault-inject…

Fault injection attacks on microcontrollers: everything you need to know and more. 👨🏽‍🏭📟⚡☠️📤

More details on:
LinkedIn: linkedin.com/posts/dlaskov_…
Substack: it4sec.substack.com/p/fault-inject…
Bjoern Kerler (@viperbjk) 's Twitter Profile Photo

It's kind of sad that I see more and more academic papers reusing my code and even removing the copyright notice and referrals to me. This is clearly a violation of academic work where all work from others has to be cited and a clear abuse of open source code.