Michele Campa (@s1ckb017) 's Twitter Profile
Michele Campa

@s1ckb017

VR at @XI_Research - my opinions are my own and do not represent the views of my employer

ID: 942494491

calendar_today11-11-2012 23:47:24

552 Tweet

1,1K Followers

458 Following

Exodus Intelligence (@xi_research) 's Twitter Profile Photo

We're pleased to announce that Exodus has been selected by the CVE Program as a CVE Numbering Authority (CNA). To date, 269 organizations from 35 countries have partnered with the CVE Program. Read more: blog.exodusintel.com/2023/02/14/exo…

We're pleased to announce that Exodus has been selected by the CVE Program as a CVE Numbering Authority (CNA).  

To date, 269 organizations from 35 countries have partnered with the CVE Program. 

Read more:
blog.exodusintel.com/2023/02/14/exo…
Exodus Intelligence (@xi_research) 's Twitter Profile Photo

Announcing EVE (Exodus Vulnerability Enrichment), our most intuitive, widely-usable product to date. EVE provides a more intuitive product for a wider range of security professionals to access our state-level research for the first time. Read More: blog.exodusintel.com/2023/03/01/exo…

windbgtips (@windbgtips) 's Twitter Profile Photo

#WinDbg tip: edit %LOCALAPPDATA%\DBG\DbgX.xml and change CommandWindowExperimental -> CommandIntellisense2 from false to true, and get a nice helper menu when typing your command in #WinDbgX

#WinDbg tip: edit %LOCALAPPDATA%\DBG\DbgX.xml and change CommandWindowExperimental -> CommandIntellisense2 from false to true, and get a nice helper menu when typing your command in #WinDbgX
Paolo Stagno (VoidSec) (@void_sec) 's Twitter Profile Photo

Reverse engineering Spybot's Terminator tool (Zemana Antimalware driver) to achieve LPE as SYSTEM and unrestricted raw SCSI disk read/write. voidsec.com/reverse-engine…

Exodus Intelligence (@xi_research) 's Twitter Profile Photo

One of our elite researchers Vignesh Rao wrote up some great work on Apple Safari: blog.exodusintel.com/2023/07/20/shi… #vulnerability #Exploit #whitehat #CyberSecurity

Exodus Intelligence (@xi_research) 's Twitter Profile Photo

Join us in London, England on Nov 14, 2023, for our highly anticipated Browser and Mobile Exploitation trainings! #exploitation #Training #Cybersecurity #London blog.exodusintel.com/2023/08/04/pub… blog.exodusintel.com/2023/08/04/pub…

vx-underground (@vxunderground) 's Twitter Profile Photo

We would like to express our condolences to Blue Teamers. Microsoft has announced Microsoft Excel will now support Python. More information: techcommunity.microsoft.com/t5/microsoft-3…

Michele Campa (@s1ckb017) 's Twitter Profile Photo

My first year as a security researcher, with frustration and adrenaline, is almost over. I thank Exodus Intelligence for awarding me with “Best LPE Essentials/0day” and with “Best LPE NDay”.

My first year as a security researcher, with frustration and adrenaline, is almost over. I thank <a href="/XI_Research/">Exodus Intelligence</a>  for awarding me with “Best LPE Essentials/0day” and with “Best LPE NDay”.
Michele Campa (@s1ckb017) 's Twitter Profile Photo

CVE-2023-36033 is easy, all you have to do is reverse 34637216783612 data structures and cry for at least 70h 🥲. Btw great vulnerability, got a lot of knowledge on the DWM internals and enjoyed the ride. Still Misses full escalation, but need to rest a bit.

CVE-2023-36033 is easy, all you have to do is reverse 34637216783612 data structures and cry for at least 70h 🥲. Btw great vulnerability, got a lot of knowledge on the DWM internals and enjoyed the ride. Still Misses full escalation, but need to rest a bit.
Exodus Intelligence (@xi_research) 's Twitter Profile Photo

A patch gap due to CVE-2024-0582 in the Ubuntu kernel in the notorious io_uring component lasted over two months. Read about how one of our talented researchers, ulisses, exploited it: blog.exodusintel.com/2024/03/27/min…

Michele Campa (@s1ckb017) 's Twitter Profile Photo

Look Mom, like Lazarus. Adobe reader 64 bits pwned with the #CVE-2023-26369 Nice vuln, powerful and not that hard to exploit. Satisfied to have used a chain of 6 functions to run my shellcode.