Samuel Chevet (@w4kfu) 's Twitter Profile
Samuel Chevet

@w4kfu

ID: 211855889

linkhttp://blog.w4kfu.com calendar_today04-11-2010 13:13:30

1,1K Tweet

1,1K Takipçi

254 Takip Edilen

Gwaby (@pwissenlit) 's Twitter Profile Photo

Oh hey! My last R&D project at quarkslab is finally out. :D tl.dr. playing with the Steam Deck is fun <3 (i.e. UEFI exploit w/ super limited primitives) blog.quarkslab.com/being-overlord…

REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

For the first time, our training "Bug Hunting in Hypervisors" is open to the public at REcon ! Designed for security researchers,we will dive into VM escapes, hypervisor attack surfaces, and real-world exploitation. More info: recon.cx/2025/trainingB…

MVG (@modernvintageg) 's Twitter Profile Photo

EA has uploaded fully recovered source code for Command & Conquer (aka, Tiberian Dawn). C&C Red Alert, C&C Renegade, and C&C Generals + Zero Hour to github. W move! github.com/electronicarts/

Tavis Ormandy (@taviso) 's Twitter Profile Photo

You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials. bughunters.google.com/blog/542484235…

Ian Beer (@i41nbeer) 's Twitter Profile Photo

My writeup of the 2023 NSO in-the-wild iOS zero-click BLASTDOOR webp exploit: Blasting Past Webp - googleprojectzero.blogspot.com/2025/03/blasti…

Silent (@__silent_) 's Twitter Profile Photo

New blog post! A bug in GTA San Andreas lay dormant for over 20 years, until unrelated changes in Windows 11 24H2 triggered it. This is a deep dive into how a simple coding mistake erased all seaplanes from the game and made them completely unusable. cookieplmonster.github.io/2025/04/23/gta…

REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

TyphoonCon🌪️ is already over, but we enjoyed every minute ! During our talk "Journey To Freedom", we disclosed for the first time the details on the Windows LPE we used at Pwn2Own Vancouver 2024 after escaping from VirtualBox. Slides are already available: reversetactics.com/publications/2…

Rémi J. (@netsecurity1) 's Twitter Profile Photo

🚨 Interested in Windows kernel exploitation? Our SSTIC 2025 talk on the Shadow Stack implementation in the Windows kernel is now online! 📄 Paper: sstic.org/media/SSTIC202… 📑 Slides: sstic.org/media/SSTIC202…

Ivan Krstić (@radian) 's Twitter Profile Photo

🔺iPhone models announced today include Memory Integrity Enforcement, the culmination of an unprecedented design and engineering effort that we believe represents the most significant upgrade to memory safety in the history of consumer operating systems. security.apple.com/blog/memory-in…

Dmitry Vyukov (@dvyukov) 's Twitter Profile Photo

First mention of x86 memory tagging (aka MTE) by both Intel and AMD (codename ChkTag): community.intel.com/t5/Blogs/Tech-… amd.com/en/blogs/2025/… 🤘🤘🤘

Synacktiv (@synacktiv) 's Twitter Profile Photo

Following their presentation at Hexacon, Mehdi & Etienne detail how they exploited CVE-2023-40129, a critical vulnerability affecting the Bluetooth stack in Android ⬇️ synacktiv.com/en/publication…

Seth Jenkins (@__sethjenkins) 's Twitter Profile Photo

We really should be talking about this more....KASLR is just not working properly on Android right now, and it hasn't for a long time. googleprojectzero.blogspot.com/2025/11/defeat…

Nitehack (@nitehack) 's Twitter Profile Photo

🥳📢After 4 years of hard work, we (LNH-team) are proud to announce that DSpico, our open-source flashcart for the DS(i), is officially released! 🌐 Find all the details on our website!: lnh-team.org

🥳📢After 4 years of hard work, we (LNH-team) are proud to announce that DSpico, our open-source flashcart for the DS(i), is officially released!
🌐 Find all the details on our website!: lnh-team.org
Synacktiv (@synacktiv) 's Twitter Profile Photo

At #Pwn2Own Berlin 2025, a full exploit chain against VMware Workstation was demonstrated via a heap overflow in the PVSCSI controller. Despite Windows 11 LFH mitigations, advanced heap shaping and side-channel techniques enabled a reliable exploit. 🔍 Full technical write-up 👇

Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

We’re releasing our analysis of ring-1.io, a major game cheat targeted by multiple studios in recent legal actions. We partially deobfuscated several Themida-protected components and document how it hijacks Hyper-V to inject and manipulate game code.

wh1te4ever (@wh1te4ever) 's Twitter Profile Photo

I have posted a write-up for those who are interested in building virtual iPhone. If have any further questions, please feel free to reach out via DM, Thanks. github.com/wh1te4ever/sup…