rtmcx (@rtmcx) 's Twitter Profile
rtmcx

@rtmcx

Member of the Synack Red Team. Researcher, pentester, shellcoder and reverse engineer. OSCE|OSCP|SLAE|eCPPT|CISSP.

ID: 1670372407

calendar_today14-08-2013 12:08:45

532 Tweet

902 Followers

1,1K Following

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Windows rootkit development for red teaming Excellent series by Ido Veltzman Part 1: idov31.github.io/2022/07/14/lor… Part 2: idov31.github.io/2022/08/04/lor… Part 3: idov31.github.io/2022/10/30/lor… Part 4: idov31.github.io/2023/02/24/lor… #windows #driver #kernel #rootkit #redteam

Windows rootkit development for red teaming
Excellent series by  <a href="/Idov31/">Ido Veltzman</a>

Part 1: idov31.github.io/2022/07/14/lor…
Part 2: idov31.github.io/2022/08/04/lor…
Part 3: idov31.github.io/2022/10/30/lor…
Part 4: idov31.github.io/2023/02/24/lor…

#windows #driver #kernel #rootkit #redteam
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Excellent blog post on TrustZone Exploitation (AMLogic A113X) by Josh boredpentester.com/retreading-the… Based on this work by blasty haxx.in/posts/dumping-… #embedded #trustzone #cybersecurity

Excellent blog post on TrustZone Exploitation (AMLogic A113X) by <a href="/boredpentester/">Josh</a>

boredpentester.com/retreading-the…

Based on this work by <a href="/bl4sty/">blasty</a>

haxx.in/posts/dumping-…

#embedded #trustzone #cybersecurity
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Excellent series on ARM64 reversing and exploitation. Credits 8kSec Heap overflow: 8ksec.io/arm64-reversin… UaF: 8ksec.io/arm64-reversin… ROP: 8ksec.io/arm64-reversin… NX and mprotect: 8ksec.io/arm64-reversin… #arm #exploit #infosec

Excellent series on ARM64 reversing and exploitation.
Credits <a href="/8kSec/">8kSec</a>

Heap overflow: 8ksec.io/arm64-reversin…
UaF: 8ksec.io/arm64-reversin…
ROP: 8ksec.io/arm64-reversin…
NX and mprotect: 8ksec.io/arm64-reversin…

#arm #exploit #infosec
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Learning the basics of Linux kernel exploitation Excellent series by I write about security stuff Debugging with QEMU: blog.k3170makan.com/2020/11/linux-… Stack Overflows: blog.k3170makan.com/2020/11/linux-… RIP control: blog.k3170makan.com/2021/01/linux-… #cybersecurity #infosec #Linux #kernel

Learning the basics of Linux kernel exploitation
Excellent series by <a href="/k3170Makan/">I write about security stuff</a> 
 
Debugging with QEMU: blog.k3170makan.com/2020/11/linux-…
Stack Overflows: blog.k3170makan.com/2020/11/linux-…
RIP control: blog.k3170makan.com/2021/01/linux-…

#cybersecurity #infosec #Linux #kernel
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Series to learn IoT/embedded devices reverse engineering (credits Juan Carlos Jiménez) Debug Ports: jcjc-dev.com/2016/04/08/rev… Firmware: jcjc-dev.com/2016/04/29/rev… Data: jcjc-dev.com/2016/05/23/rev… Flash: jcjc-dev.com/2016/06/08/rev… Digging the Firmware: jcjc-dev.com/2016/12/14/rev… #iot

Series to learn IoT/embedded devices reverse engineering (credits <a href="/Palantir555/">Juan Carlos Jiménez</a>)

Debug Ports: jcjc-dev.com/2016/04/08/rev… 
Firmware: jcjc-dev.com/2016/04/29/rev… 
Data: jcjc-dev.com/2016/05/23/rev… 
Flash: jcjc-dev.com/2016/06/08/rev… 
Digging the Firmware: jcjc-dev.com/2016/12/14/rev… 

#iot
Azeria (@fox0x01) 's Twitter Profile Photo

Overwhelmed by all the support I’m receiving from the community. 🥹🙏🏼 As a small thank you, I made all my high-resolution Arm assembly cheat sheets available for free 💙 Get them here:

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Nice short reading for anyone interested in starting with embedded/IoT devices analysis and reversing. Credits cyber wolf whiterose-infosec.super.site/mjsxj09cm-reco… #embedded #infosec

Nice short reading for anyone interested in starting with embedded/IoT devices analysis and reversing.
Credits <a href="/CyberWolf_2077/">cyber wolf</a>

whiterose-infosec.super.site/mjsxj09cm-reco…

#embedded #infosec
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Framework for multi architecture emulation and firmware fuzzing (Icicle) Paper: arxiv.org/pdf/2301.13346… github repo (pre-release): github.com/icicle-emu/ici… #fuzzing #firmware #rustlang #cybersecurity

Framework for multi architecture emulation and firmware fuzzing (Icicle)

Paper: arxiv.org/pdf/2301.13346…
github repo (pre-release): github.com/icicle-emu/ici…

#fuzzing #firmware #rustlang #cybersecurity
0xor0ne (@0xor0ne) 's Twitter Profile Photo

In this excellent blog post, Olivier Laflamme (Boschko) goes through practical examples of how Shambles, a tool by Lian Security, can be used to reverse engineer and find vulnerabilities in embedded/IoT devices boschko.ca/shambles/ #infosec #iot #cybersecurity

In this excellent blog post, Olivier Laflamme (<a href="/olivier_boschko/">Boschko</a>) goes through practical examples of how Shambles, a tool by Lian Security, can be used to reverse engineer and find vulnerabilities in embedded/IoT devices 

boschko.ca/shambles/

#infosec #iot #cybersecurity
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Series on fuzzing open source software using fuzzuf by Ricerca Security ricercasecurity.blogspot.com/2023/07/fuzzin… ricercasecurity.blogspot.com/2023/07/fuzzin… ricercasecurity.blogspot.com/2023/07/fuzzin… ricercasecurity.blogspot.com/2023/07/fuzzin… #fuzzing #cybersecurity

Series on fuzzing open source software using fuzzuf by <a href="/RicercaSec/">Ricerca Security</a>

ricercasecurity.blogspot.com/2023/07/fuzzin…
ricercasecurity.blogspot.com/2023/07/fuzzin…
ricercasecurity.blogspot.com/2023/07/fuzzin…
ricercasecurity.blogspot.com/2023/07/fuzzin…

#fuzzing #cybersecurity
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Interesting series on how virtualization works (VMware, XEN, QEMU) Credits @LordNoteworthy Part 1: docs.saferwall.com/blog/virtualiz… Part 2: docs.saferwall.com/blog/virtualiz… Part 3: docs.saferwall.com/blog/virtualiz… Part 4: docs.saferwall.com/blog/virtualiz… #virtualization #infotech

Interesting series on how virtualization works (VMware, XEN, QEMU)
Credits @LordNoteworthy

Part 1: docs.saferwall.com/blog/virtualiz…
Part 2: docs.saferwall.com/blog/virtualiz…
Part 3: docs.saferwall.com/blog/virtualiz…
Part 4: docs.saferwall.com/blog/virtualiz…

#virtualization #infotech
Sticker Mule (@stickermule) 's Twitter Profile Photo

Hi All, We are giving away $500 every time we post to our timeline this August. Whether you love us or really love us all you have to do is REPOST or REPLY to our timeline posts to enter. And, to our handful of haters, you, of course, can enter too. Rules are here:

r4ulcl (@_r4ulcl_) 's Twitter Profile Photo

🔍 Want to learn how to hack Wi-Fi networks? The CWP course from WiFiChallenge Academy will take you from beginner to expert with hands-on labs and real-world scenarios. Join the mailing list to be the first to know when it launches! #WiFiChallenge academy.wifichallenge.com

🔍 Want to learn how to hack Wi-Fi networks? The CWP course from WiFiChallenge Academy will take you from beginner to expert with hands-on labs and real-world scenarios. Join the mailing list to be the first to know when it launches! #WiFiChallenge
academy.wifichallenge.com
WiFiChallenge (@wifichallenge) 's Twitter Profile Photo

🛡️ Master the art of auditing Wi-Fi networks! The CWP course at WiFiChallenge Academy is designed for both beginners and experts. Get ready to tackle real-world challenges with confidence in the WiFiChallenge Lab. Launching September 23rd! wifchall.com/cwp #WiFiChallenge

WiFiChallenge (@wifichallenge) 's Twitter Profile Photo

🚨 The Certified WiFiChallenge Professional course is live NOW! 🚀 Exclusive discounts for the first 50 buyers, up to 50% off! Don’t miss out! 💻 #WiFiChallenge wifchall.com/cwp

Disconnect3d (@disconnect3d_pl) 's Twitter Profile Photo

Pwndbg 2025.01 is out! It adds official LLDB support including support for macOS and Mach-O binaries, improved performance, enhanced embedded debugging & many more! Also, want to support us or buy us a coffee? See our GH sponsors: github.com/sponsors/pwndbg github.com/pwndbg/pwndbg/…

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Slide decks on getting started with Linux kernel exploitation "Linux Kernel Exploitation for Beginners" by Kevin Massey: rvasec.com/slides/2025/Ma… "Control Flow Hijacking in the Linux Kernel" by Valeriy Yashnikov pt-phdays.storage.yandexcloud.net/Yashnikov_Vale… #Linux #infosec

Slide decks on getting started with Linux kernel exploitation

"Linux Kernel Exploitation for Beginners" by Kevin Massey:
rvasec.com/slides/2025/Ma…

"Control Flow Hijacking in the Linux Kernel" by Valeriy Yashnikov
pt-phdays.storage.yandexcloud.net/Yashnikov_Vale…

#Linux #infosec