Robbert Popcorn (@robbert_1978) 's Twitter Profile
Robbert Popcorn

@robbert_1978

Intern @vngsecresponse | CTF player ( Pwn ) for TheRoundTable (m1cr0$oft 0ff1c3) | Shameful team @_cosgang_ | noob at @idekCTF | GCC 2024 🇹🇭

ID: 1284129703528329217

linkhttps://robbert1978.github.io/ calendar_today17-07-2020 14:16:08

276 Tweet

253 Takipçi

1,1K Takip Edilen

Ammar Faizi (@ammarfaizi2) 's Twitter Profile Photo

godbolt.org/z/6aWs1nYa1 Tested GCC 15.1 today. Nice improvements! GCC now skips stack-setup and callee-saved registers push-pop if a function returns early without using them. Green box = Good early return, no extra stack. Red box = Bad, does not avoid unnecessary steps.

godbolt.org/z/6aWs1nYa1

Tested GCC 15.1 today. Nice improvements!

GCC now skips stack-setup and callee-saved registers push-pop if a function returns early without using them.

Green box = Good early return, no extra stack.

Red box = Bad, does not avoid unnecessary steps.
ö (@r0keb) 's Twitter Profile Photo

Good morning! Just published a deep dive into PatchGuard internals: how it works, key internal functions, context init, and possible bypasses. r0keb.github.io/posts/PatchGua…

GuidedHacking (@guidedhacking) 's Twitter Profile Photo

🛠️ Tracing API Calls With Tiny Tracer 🧩 Utilize Intel's pin tool for code control 🔍 Bypass RDTSC checks, detect anti-debug API 🔗 Identify Original Entry Points (OEP) quickly 🧩 Unpack binaries, find hidden code sections 👉 guidedhacking.com/threads/tiny-t…

🛠️ Tracing API Calls With Tiny Tracer
🧩 Utilize Intel's pin tool for code control
🔍 Bypass RDTSC checks, detect anti-debug API
🔗 Identify Original Entry Points (OEP) quickly
🧩 Unpack binaries, find hidden code sections
👉 guidedhacking.com/threads/tiny-t…
h0mbre (@h0mbre_) 's Twitter Profile Photo

how i picture linux kernel VR: - learning about CPU sidechannels - learning about required primitives to bypass Google mitigations - auditing complicated surfaces for exploitable bugs - brainstorming exploit strats with friends what it actually is: - getting netlink libs to work

Pumpkin 🎃 (@u1f383) 's Twitter Profile Photo

A bit late, but I just published my blog post on bypassing Ubuntu’s sandbox! Hope you enjoy it! u1f383.github.io/linux/2025/06/…

MatheuZ (@matheuzsecurity) 's Twitter Profile Photo

I just published a new post on Red Team Tactics: Evading EDR on Linux with io_uring, and also shared the RingReaper project I used for the POC. RingReaper: github.com/MatheuZSecurit… Article: matheuzsecurity.github.io/hacking/evadin… #malware #c2 #io_uring #redteam

I just published a new post on Red Team Tactics: Evading EDR on Linux with io_uring, and also shared the RingReaper project I used for the POC.

RingReaper: github.com/MatheuZSecurit…

Article: matheuzsecurity.github.io/hacking/evadin…

#malware #c2 #io_uring #redteam
winterknife 🌻 (@_winterknife_) 's Twitter Profile Photo

Just released a project to get the current logical processor's ID just like how kernel32!GetCurrentProcessorNumber() works under the hood :) github.com/winterknife/EV…

Just released a project to get the current logical processor's ID just like how kernel32!GetCurrentProcessorNumber() works under the hood :)
github.com/winterknife/EV…
hackyboiz (@hackyboiz) 's Twitter Profile Photo

[Research] CVE-2025-24985: Windows Fast FAT Driver RCE Vulnerability hackyboiz.github.io/2025/07/17/ogu… The vulnerability was caused by the ability to control five variables within the VHD file that determine the number of clusters.

[Research] CVE-2025-24985: Windows Fast FAT Driver RCE Vulnerability

hackyboiz.github.io/2025/07/17/ogu…

The vulnerability was caused by the ability to control five variables within the VHD file that determine the number of clusters.
ENKI WhiteHat (@enki_official_x) 's Twitter Profile Photo

Curious how the Codegate 2025 FullChain was meant to be pwned? From RCE to SBX to LPE... the path to SYSTEM is now public. Official write-up is live! #pwn #CTF #Codegate #RCE #SBX #LPE enki.co.kr/en/media-cente…

xvonfers (@xvonfers) 's Twitter Profile Photo

(CVE-2025-38084, CVE-2025-38085)[mm/hugetlb]hugetlb page table sharing races with VMA splitting -> page table UAF git.kernel.org/pub/scm/linux/… git.kernel.org/pub/scm/linux/… project-zero.issues.chromium.org/issues/4207157… Reported by Jann Horn(Jann Horn - [email protected] )

sixtyvividtails (@sixtyvividtails) 's Twitter Profile Photo

Finally, a script to estimate IQ of your PC! Copypaste it into powershell console, get instant result! $9={[Runtime.InteropServices.Marshal]:: ReadInt64(1TB-64MB-+-$args[0]-shr9)};` (&$9 4KB)/(&$9 (900.9MB/9.9/7-shr5))/` 25/(&$9)*(2L-shl55) But can you deduce what metric it is?

Finally, a script to estimate IQ of your PC!
Copypaste it into powershell console, get instant result!

$9={[Runtime.InteropServices.Marshal]::
ReadInt64(1TB-64MB-+-$args[0]-shr9)};`
(&$9 4KB)/(&$9 (900.9MB/9.9/7-shr5))/`
25/(&$9)*(2L-shl55)

But can you deduce what metric it is?
ö (@r0keb) 's Twitter Profile Photo

Good Morning! Just published a blog post analyzing Hyper-V functionality, design, and key binaries, hvix64.exe (hypervisor), securekernel.exe (secure kernel), and winload.dll (boot-time loader and CPU check). r0keb.github.io/posts/Hyper-V-…

Jord (@0xlegacyy) 's Twitter Profile Photo

Developing a scriptable (pwndbg-like) debugger for windows. Few more things we need to iron out but will be releasing soon 🐸

Developing a scriptable (pwndbg-like) debugger for windows. Few more things we need to iron out but will be releasing soon 🐸