
James Forshaw
@tiraniddo
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Tweets are my own etc. Mastodon: @[email protected]
ID: 58304160
https://www.tiraniddo.dev 19-07-2009 21:51:28
6,6K Tweet
49,49K Takipçi
343 Takip Edilen




We finished our presentation at #BHUSA and the slides were published here: i.blackhat.com/BH-US-24/Prese…, you can also find the latest slides and demo here: github.com/ga1ois/BlackHa…, enjoy, especially for our new "field confusion" V8 sbx escape technique : ) Edouard Bochin Black Hat


Just to remind people I'll be signing copies of my book at 12:30 at Defcon today at the No Starch Press vendor area. See nostarch.com/defcon for details.




Put up the slides for my Microsoft BlueHat 2024 presentation on improvements to OleView.NET github.com/tyranid/infose… You can also grab v1.15 of OleView.NET from the PS Gallery which has the new features to generate proxy clients on the fly.


Project Zero Blogpost recap for the month: googleprojectzero.blogspot.com/2024/10/the-wi… — j00ru//vx doing another deep dive into the Windows Registry googleprojectzero.blogspot.com/2024/10/effect… — Nick Galloway's dav1d fuzzing case study (new) googleprojectzero.blogspot.com/2024/10/from-n… — an update on using LLMs to find vulns Enjoy! 🎉


Finding 0day is not the most impactful thing that Project Zero does 😲 — it's sharing knowledge 🧠. One part of that sharing is our tooling work to help other devs and reserachers. Today's installment, James Forshaw's updated OleView.NET👍 Blog: googleprojectzero.blogspot.com/2024/12/window…

My blog post is now live alongside Amnesty International 's joint release, providing remarkable insight into an ITW exploitation campaign! googleprojectzero.blogspot.com/2024/12/qualco… Turns out that you can find out quite a bit with just some kernel stacktraces ;) From Amnesty: securitylab.amnesty.org/latest/2024/12…

If you've ever wondered if one can determine a vuln from just the kernel panic logs, Seth Jenkins (feat. Jann Horn - [email protected] & Benoît) have something to share: googleprojectzero.blogspot.com/2024/12/qualco… Great to collaborate with Amnesty International, find vulns and get them fixed: securitylab.amnesty.org/latest/2024/12…

Two new posts from James Forshaw today: googleprojectzero.blogspot.com/2025/01/window… on reviving a memory trapping primitive from his 2021 post. googleprojectzero.blogspot.com/2025/01/window… where he shares a bug class and demonstrates how you can get a COM object trapped in a more privileged process. Happy Reading! 📚

James Forshaw and his 🐼 panda kicks-off Day 2 Off-By-One Conference 2025 with 𝐈𝐟 𝐲𝐨𝐮 𝐝𝐨𝐧'𝐭 𝐜𝐚𝐫𝐞 𝐚𝐛𝐨𝐮𝐭 𝐚 𝐯𝐮𝐥𝐧𝐞𝐫𝐚𝐛𝐢𝐥𝐢𝐭𝐲, 𝐰𝐡𝐲 𝐬𝐡𝐨𝐮𝐥𝐝 𝐈? Full house yo!


More goodies!! James Forshaw , Keynote Speaker at Off-By-One Conference books are available at No Starch Press . Use our conference discount code 𝐎𝐅𝐅𝐁𝐘𝟑𝟎 to enjoy a 30% on James books! nostarch.com/networkprotoco… nostarch.com/windows-securi…

