0x140ce (@0x140ce) 's Twitter Profile
0x140ce

@0x140ce

sleep eat without pwn
Ant Group Light-Year Security Lab
pwnfest 2016/pwn2own 2017/tianfucup 2019,2020,2021,2023/geekpwn 2022/Pwnie Awards 2023

ID: 1195594628872826880

calendar_today16-11-2019 06:49:11

2 Tweet

653 Followers

1 Following

0x140ce (@0x140ce) 's Twitter Profile Photo

Successfully bypassing the ArrayBuffer isolation in Adobe Reader and completing the fullchain with Ezrak1e, I will have the opportunity to share with how to perform heap layout under ArrayBuffer isolation and how my vul can reuse the ArrayBuffer as an arbitrary R/W primitive.

Successfully bypassing the ArrayBuffer isolation in Adobe Reader and completing the fullchain with <a href="/ezrak1e/">Ezrak1e</a>, I will have the opportunity to share with how to perform heap layout under ArrayBuffer isolation and how my vul can reuse the ArrayBuffer as an arbitrary R/W primitive.
0x140ce (@0x140ce) 's Twitter Profile Photo

I am very glad to be the MSRC Q1 top. During this process, the greatest gain for me was discussing with Danis Jiang on how to use LLM to assist in fuzzing and vulnerability discovery.

Danis Jiang (@danis_jiang) 's Twitter Profile Photo

Our talk "Dark Corners: How a Failed Patch Left VMware ESXi VM Escapes Open for Two Years" has been accepted by BlackHat USA 2025! Super excited to present this work with 0x140ce and Ezrak1e. See you at #BHUSA! Black Hat blackhat.com/us-25/briefing…

Our talk "Dark Corners: How a Failed Patch Left VMware ESXi VM Escapes Open for Two Years" has been accepted by BlackHat USA 2025!

Super excited to present this work with <a href="/0x140ce/">0x140ce</a> and <a href="/ezrak1e/">Ezrak1e</a>. See you at #BHUSA! <a href="/BlackHatEvents/">Black Hat</a>

blackhat.com/us-25/briefing…