red0xff (@red0xff) 's Twitter Profile
red0xff

@red0xff

Vulnerability research at  @apple
Open Source / Offensive Security

ID: 1288423090196746244

linkhttps://red0xff.github.io/about/ calendar_today29-07-2020 10:36:40

37 Tweet

498 Followers

696 Following

red0xff (@red0xff) 's Twitter Profile Photo

For the last three months, I've been working with rapid7, taking part at Google Summer of Code, contributed a library that will facilitate SQL injection in Metasploit modules, and a few modules making use of it. red0xff.github.io/posts/google_s…

red0xff (@red0xff) 's Twitter Profile Photo

I contributed some challenges to BSides Algiers Quals CTF (which started just a few minutes ago). Check them out at ctf.bsidesalgiers.com

I contributed some challenges to BSides Algiers Quals CTF (which started just a few minutes ago).

Check them out at ctf.bsidesalgiers.com
Alisa Esage Шевченко (@alisaesage) 's Twitter Profile Photo

☀️ Summer Solstice philanthropy: I am making this mini-class available for free! 4 hours of deeply systematical theory & practice introduction on hypervisor vulns and how to find them, taught by a specialist researcher, bug hunter and pwner 🔥 How to claim your seat, thread 👉🏻

red0xff (@red0xff) 's Twitter Profile Photo

gist.github.com/red0xff/76192a… Not really a writeup, but I'm sharing my solution to Qilinglab, thanks to Shielder, that was cool, and to Qiling Framework

Malware Unicorn (@malwareunicorn) 's Twitter Profile Photo

New workshop: PE Injection Study. Goes over the NtQueueApcThread injection routine from the malware Cryptowall for offensive tooling in golang. malwareunicorn.org/workshops/pein…

red0xff (@red0xff) 's Twitter Profile Photo

Just published a new article about Keccak/Sha3 (explains its steps in simple words, and explains how leaking the internal state can lead to unwanted consequences) red0xff.github.io/posts/invertin… Feedback is welcome (PS: I'm not a cryptographer)

HyperDbg (@hyperdbg) 's Twitter Profile Photo

Here are 11 reasons why we should use #HyperDbg, the differences between HyperDbg and #WinDbg, and how HyperDbg will change our debugging/reversing journey. A thread (24 tweets) 🧵:

Hexacon (@hexacon_fr) 's Twitter Profile Photo

Hajime! We are glad to announce our second ring0 sponsor! 🙏 Thank you RandoriSec for helping us to gather the infosec community in Paris ⛩️ To find out more about RandoriSec, visit their website at randorisec.fr #HEXACON2022

Hajime! We are glad to announce our second ring0 sponsor!

🙏 Thank you <a href="/RandoriSec/">RandoriSec</a> for helping us to gather the infosec community in Paris

⛩️ To find out more about RandoriSec, visit their website at randorisec.fr

#HEXACON2022
RandoriSec (@randorisec) 's Twitter Profile Photo

Heap buffer overflow within the Netfilter subsystem of the Linux kernel (CVE-2022-34918). ps: Metasploit Project module coming soon. randorisec.fr/crack-linux-fi… #netfilter #0day

Man Yue Mo (@mmolgtm) 's Twitter Profile Photo

This might be the best bug I found. Never thought I'd be writing a kernel exploit as reliable, clean and fast as a browser exploit. For a while I actually used this to root my research phone when can't be bothered to patch the rom: github.blog/2022-07-27-cor…

red0xff (@red0xff) 's Twitter Profile Photo

A random idea I had that turned into a short new blog post. (This post does not demonstrate a vulnerability, but rather a logic flaw in the execution environments of the most popular competitive programming platforms). red0xff.github.io/posts/cracking…

Ivan Krstić (@radian) 's Twitter Profile Photo

🔺This is the first talk I've given in 6 years – featuring formal verification of post-quantum cryptography, the evolution of the Secure Page Table Monitor, a view into Memory Integrity Enforcement, updates to Apple Security Bounty… and a personal note.