reverseame (@reverseame) 's Twitter Profile
reverseame

@reverseame

RME-DisCo research group from University of Zaragoza. Special interest on software and systems security. Link to our Telegram channel: t.me/reverseame

ID: 4827396790

linkhttps://reversea.me/ calendar_today19-01-2016 19:20:19

5,5K Tweet

19,19K Takipçi

1 Takip Edilen

reverseame (@reverseame) 's Twitter Profile Photo

One-Click RCE in ASUS’s Preinstalled Driver Software #ASUS #RCE #SecurityVulnerability #BugBounty #CVE-2025-3462 mrbruh.com/asusdriverhub/

reverseame (@reverseame) 's Twitter Profile Photo

Mithra LLM Scanner #MithraLLMScanner #ScanLLMIntegratedAPIs #AIEndpointSecurity #AVIDandOWASP #AdvancedControls mithrasec.com

reverseame (@reverseame) 's Twitter Profile Photo

Modernizing LDAP with Keycloak: Build a Scalable, Secure IAM Architecture #ModernizeLDAP #Keycloak #SecureIAM #ScalableArchitecture #EasyIntegration cloud-iam.com/post/ldap-idp-…

reverseame (@reverseame) 's Twitter Profile Photo

Stateful Connection With Spoofed Source IP — NetImpostor #StatefulConnection #SpoofedSourceIP #ARPpoisoning #NetImpostor #NetworkImpersonation tastypepperoni.medium.com/stateful-conne…

reverseame (@reverseame) 's Twitter Profile Photo

Eclipse on Next.js: Conditioned exploitation of an intended race-condition #NextJsEclipseExploitation #RaceConditionResearch #RaceConditionExploit #CachePoisoning #WebSecurityResearch zhero-web-sec.github.io/research-and-t…

reverseame (@reverseame) 's Twitter Profile Photo

Finding Heap Overflows with AFL++ Unicorn Mode #HeapOverflow #Fuzzing #UnicornMode #MemorySafety #BlackHatUSA medium.com/@cy1337/findin…

reverseame (@reverseame) 's Twitter Profile Photo

Red Team Gold: Extracting Credentials from MDT Shares #TrustedSec #RedTeamGold #MDTShares #CredentialsExtraction #EnterpriseSecurity trustedsec.com/blog/red-team-…

reverseame (@reverseame) 's Twitter Profile Photo

Humans are Insecure Password Generators #HumansInsecurePasswords #PasswordCracking #NeuralNetworks #PasswordSecurity #PasswordManager outsidetheasylum.blog/humans-are-ins…

reverseame (@reverseame) 's Twitter Profile Photo

Branch Privilege Injection: Exploiting Branch Predictor Race Conditions #BranchPrivilegeInjection #RaceCondition #Intel #Vulnerability #SecurityMitigations comsec.ethz.ch/research/micro…

reverseame (@reverseame) 's Twitter Profile Photo

CefSharp Enumeration With CefEnum #DarkForgeLabs #CefEnum #CEF #CefSharp #ThickClientSecurity blog.darkforge.io/cef/cefsharp/c…

reverseame (@reverseame) 's Twitter Profile Photo

Authenticated Remote Code Execution in Netwrix Password Secure (CVE-2025-26817) #CVE2025 #Netwrix #RCE #PasswordSecure #RemoteCodeExecution 8com.de/cyber-security…

reverseame (@reverseame) 's Twitter Profile Photo

Automating MS-RPC vulnerability research #AutomatingVulnerabilityResearch #MS-RPCProtocol #FuzzingApproach #NTObjectManager #SecurityResearch incendium.rocks/posts/Automati…

reverseame (@reverseame) 's Twitter Profile Photo

Live Forensic Collection from Ivanti EPMM Appliances (CVE-2025-4427 & CVE-2025-4428) #LiveForensicCollection #IvantiEPMMAppliances #CVE20254427 #CVE20254428 #ProferoInsights profero.io/blog/ivanti-ep…

reverseame (@reverseame) 's Twitter Profile Photo

CVE-2025-32756: Low-Rise Jeans are Back and so are Buffer Overflows #CVE-2025-32756 #NodeZero #RCE #BufferOverflow #Fortinet horizon3.ai/attack-researc…

reverseame (@reverseame) 's Twitter Profile Photo

BadUSB Attack Explained: From Principles to Practice and Defense #BadUSBAttack #USBsecurity #ArduinoHack #DefenseStrategy #CybersecurityTips insbug.medium.com/badusb-attack-…

reverseame (@reverseame) 's Twitter Profile Photo

How I ruined my vacation by reverse engineering WSC #ReverseEngineering #WindowsDefender #PainfulResearch #DebuggingWSC blog.es3n1n.eu/posts/how-i-ru…