Vincent R (@vrome_) 's Twitter Profile
Vincent R

@vrome_

Just another InfoSec guys and, CTFplayer Aka Light 🤷

ID: 828942729543561216

calendar_today07-02-2017 12:25:22

203 Tweet

248 Followers

1,1K Following

Underfox (@underfox3) 's Twitter Profile Photo

Researchers have discovered a novel way to exploit speculative dereferences,enabling direct leakage of data values stored in registers, showing that this effect can be adapted to Foreshadow by using addresses not valid in any address space of the guest. arxiv.org/pdf/2008.02307…

Researchers have discovered a novel way to exploit speculative dereferences,enabling direct leakage of data values stored in registers, showing that this effect can be adapted to Foreshadow by using addresses not valid in any address space of the guest.

arxiv.org/pdf/2008.02307…
Vincent R (@vrome_) 's Twitter Profile Photo

Go check Pesidious --> Malware Mutation using Deep Reinforcement Learning youtube.com/watch?v=aplHu2… github.com/Vi45en/Pesidio…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Google open-sources Atheris Python Fuzzer that can automatically find bugs in Python code and native extensions in Python 2.7 and Python 3.3+ github.com/google/atheris

NCC Group Research & Technology (@nccgroupinfosec) 's Twitter Profile Photo

Technical Write-Up - ABSTRACT SHIMMER (CVE-2020-15257): Host Networking is root-Equivalent, Again, by jtd research.nccgroup.com/2020/12/10/abs…

Nicolas Crocfer (@ncrocfer) 's Twitter Profile Photo

OpenCVE, a platform used for your CVE alerting and formerly known as Saucs, is now available ! The code is on Github, so you can install it or directly use opencve.io ;)

OpenCVE, a platform used for your CVE alerting and formerly known as Saucs, is now available ! 

The code is on Github, so you can install it or directly use  opencve.io ;)
Sheila A. Berta (@unapibageek) 's Twitter Profile Photo

If you missed my free workshop on #docker & #kubernetes defense, here is the recording 👌 ⬇️ sectrain.hitb.org/hitb-workshops/

LiveOverflow 🔴 (@liveoverflow) 's Twitter Profile Photo

I'm feeling generous tonight ☺️ I'm giving away 100 FREE subscriptions for LiveOverflow!! Please retweet to spread the word! youtube.com/c/LiveOverflow…

Vincent R (@vrome_) 's Twitter Profile Photo

This year there is two talk about eBPF as Linux kernel Rootkit. (some CVE inside too) youtu.be/g6SKWT7sROQ youtu.be/5zixNDolLrg Ok eBPF is must have for observability/securit. But where is basic law of speration of the priviliege. Is the cure worse than the disease?

Alisa Esage Шевченко (@alisaesage) 's Twitter Profile Photo

Releasing full 2+hr video of my browser exploitation workshop from VXCON 2024: youtube.com/live/b9OhamkAY… In which I show what goes inside the mind of a skilled hacker while exploiting a highly non-trivial vulnerability in v8, from zero to exploit concept. Especially this workflow

Ivan Fratric 💙💛 (@ifsecure) 's Twitter Profile Photo

This weekend, I gave a talk on web browser security research at a student-organized conference. I tried to make the talk reasonably beginner-friendly, so the slides (linked here) could hopefully be useful to someone as a learning resource. docs.google.com/presentation/d…

Matt Johansen (@mattjay) 's Twitter Profile Photo

Nice. JS0N Haddix is a legend. He just published a treasure trove of context to feed your agents to help them produce more secure code. github.com/Arcanum-Sec/se…