Meysam (@r00tkitsmm) 's Twitter Profile
Meysam

@r00tkitsmm

Security researcher

ID: 882319124

linkhttps://R00tkitsmm.github.io calendar_today15-10-2012 13:26:48

782 Tweet

10,10K Followers

699 Following

Karol Mazurek (@karmaz95) 's Twitter Profile Photo

🚀 New blog post! 🚀 "A History of #NULL Pointer Dereferences on macOS." Discover how #Apple's security measures have evolved, making these vulnerabilities unexploitable on modern systems. Enjoy! #macOS #Cybersecurity #Vulnerability afine.com/history-of-nul…

Binni Shah (@binitamshah) 's Twitter Profile Photo

Brushing Up on Hardware Hacking (Part 3 - SWD and OpenOCD) : voidstarsec.com/blog/brushing-… Part 2 - SPI, UART, Pulseview, and Flashrom : voidstarsec.com/blog/brushing-… Part 1 - PiFex Configuration : voidstarsec.com/blog/pifex-pig… credits wrongbaud

Brushing Up on Hardware Hacking (Part 3 - SWD and OpenOCD)  : voidstarsec.com/blog/brushing-…

Part 2 - SPI, UART, Pulseview, and Flashrom : voidstarsec.com/blog/brushing-…

Part 1 - PiFex Configuration : voidstarsec.com/blog/pifex-pig… credits <a href="/wrongbaud/">wrongbaud</a>
Epsilon (@epsilon_sec) 's Twitter Profile Photo

About to celebrate Easter with your family but don't know what to talk about at the table? Then don't lose time and read our new article about RPAC! blog.epsilon-sec.com/cve-2025-31201…

About to celebrate Easter with your family but don't know what to talk about at the table?
Then don't lose time and read our new article about RPAC!
blog.epsilon-sec.com/cve-2025-31201…
Meysam (@r00tkitsmm) 's Twitter Profile Photo

Very interesting article. This PAC bypass also relies on substitution attacks, similar to what we saw a couple of days ago in googleprojectzero.blogspot.com/2025/03/blasti… An attacker can simply overwrite a pointer intended for one purpose with a pointer intended for another purpose if both purposes

OnHexGroup (@onhexgroup) 's Twitter Profile Photo

آقای . پستی منتشر کردن با عنوان "Pishi Reloaded: Binary only address sanitizer for macOS KEXT" و در اون به ارائه ی خودشون در کنفرانس #Zer0Con2025 پرداختن. r00tkitsmm.github.io/fuzzing/2025/0… همچنین سورس کد Pishi v-0.9 رو هم منتشر کردن. github.com/R00tkitSMM/Pis… #فازر #fuzzing

POC_Crew 👨‍👩‍👦‍👦 (@poc_crew) 's Twitter Profile Photo

🛠️ [POC2025] TRAINING MacOS/iOS Kernel User Fuzzing Training by Meysam Firouzi (.) 📅 Nov 10-12 (3 days) 📍 Four Seasons Hotel Seoul, South Korea 🔗 More info powerofcommunity.net/#training #POC2025

🛠️ [POC2025] TRAINING

MacOS/iOS Kernel User Fuzzing Training
by Meysam Firouzi (<a href="/R00tkitSMM/">.</a>)

📅 Nov 10-12 (3 days)
📍 Four Seasons Hotel Seoul, South Korea

🔗 More info powerofcommunity.net/#training
#POC2025
POC_Crew 👨‍👩‍👦‍👦 (@poc_crew) 's Twitter Profile Photo

#POC2025 TRAINING "Early bird registration closes today!" 📅 Nov 10-12 (3 days) 📍 Four Seasons Hotel Seoul, South Korea 🔗 More info powerofcommunity.net/#training

#POC2025  TRAINING

"Early bird registration closes today!"

📅 Nov 10-12 (3 days)
📍 Four Seasons Hotel Seoul, South Korea

🔗 More info powerofcommunity.net/#training
Meysam (@r00tkitsmm) 's Twitter Profile Photo

𝗖𝗩𝗘-𝟮𝟬𝟮𝟱-𝟮𝟳𝟬𝟲𝟮 is one of my favorite Linux kernel vulnerabilities that we have discovered/exploited together with my brilliant former colleague Slava Moskvin | Path Cybersec docs.qualcomm.com/product/public…

Hamid Kashfi (@hkashfi) 's Twitter Profile Photo

Wondering where you can learn state of the art and cutting-edge knowledge where Fuzzing and iOS/MacOS intersects? Meysam has got you covered!

Meysam (@r00tkitsmm) 's Twitter Profile Photo

Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators usenix.org/conference/use…