SinSinology (@sinsinology) 's Twitter Profile
SinSinology

@sinsinology

Pwn2Own 20{22,23,24,24.5,25}, i look for 0-Days but i find N-Days & i chase oranges 🍊

ID: 1003519631389331457

linkhttps://summoning.team/ calendar_today04-06-2018 06:11:39

2,2K Tweet

13,13K Followers

624 Following

smaury (@smaury92) 's Twitter Profile Photo

👋🏿 Hackers! Are you a Red Teaming Wizard 🧙🏿 looking for a new challenge? Shielder is hiring a Red Teaming Lead to join our crew! More info ⬇️ (share appreciated) #hiring #redteaming romhack.io/job-opportunit…

watchTowr (@watchtowrcyber) 's Twitter Profile Photo

we grew up in #phrack - so a huge thank you to our friends @ Phrack Staff for offering us the privilege to be on the back cover of Phrack 72. Did the scene die? Who knows ;-)

we grew up in #phrack - so a huge thank you to our friends @ Phrack Staff for offering us the privilege to be on the back cover of Phrack 72.

Did the scene die? Who knows ;-)
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Congrats to Ken Gannon (@yogehi) of NCC Group (NCC Group Research & Technology) for winning the Pwnie for Best Mobile Bug for his #Samsung exploit he used at #Pwn2Own Ireland! We hope he returns in a few weeks with something even better.

Congrats to Ken Gannon (@yogehi) of NCC Group (<a href="/NCCGroupInfosec/">NCC Group Research & Technology</a>) for winning the Pwnie for Best Mobile Bug for his #Samsung exploit he used at #Pwn2Own Ireland! We hope he returns in a few weeks with something even better.
faulty *ptrrr (@0x_shaq) 's Twitter Profile Photo

Dropped a new blogpost. CVE-2025-52970: how I turned a limited, blind OOB read primitive into a full authentication bypass in one of Fortinet’s products :) pwner.gg/blog/2025-08-1…

Neodyme (@neodyme) 's Twitter Profile Photo

Back from Black Hat & DEF CON! 🎉 Our colleagues delivered insightful trainings on crypto hacking and binary exploitation and got amazing feedback from the crowd 🙌 Missed it? We offer tailored security trainings for companies too. Just reach out.

Back from <a href="/BlackHatEvents/">Black Hat</a> &amp; <a href="/defcon/">DEF CON</a>! 🎉
Our colleagues delivered insightful trainings on crypto hacking and binary exploitation and got amazing feedback from the crowd 🙌
Missed it? We offer tailored security trainings for companies too. Just reach out.
Horizon3 Attack Team (@horizon3attack) 's Twitter Profile Photo

Our latest disclosures for CVE-2025-8355 and CVE-2025-8356 - discovering a critical RCE in Xerox FreeFlow Core horizon3.ai/attack-researc…

chompie (@chompie1337) 's Twitter Profile Photo

Tomorrow 7 PM PDT! Livestream w me and MalwareTech. We’ll look at this month’s Patch Tuesday, dissect a bindiff, and try to turn it into an exploit. I might also try to get him to solve the STILL UNSOLVED Windows Phrack CTF challenge 🤔 twitch.tv/malwaretechblog

那个饺子🦆(JJ) (@thatjiaozi) 's Twitter Profile Photo

Here is the PoC of the exploit for cve-2025-30712 as well as some of the code for the fuzzer i created to find the bug! github.com/google/securit…

atc1441 (@atc1441) 's Twitter Profile Photo

Quick teardown video of an Battery powered 4" LCD Screen Mirror device around 25€ from Aliexpress TLDR: Main SoC is an HCSEMI C3100 which is very similar to the one used in the 20€ Handheld Console SF2000 Video Here: youtu.be/pFBn6lMJ7q8

Quick teardown video of an Battery powered 4" LCD Screen Mirror device around 25€ from Aliexpress

TLDR: Main SoC is an HCSEMI C3100 which is very similar to the one used in the 20€ Handheld Console SF2000

Video Here:
youtu.be/pFBn6lMJ7q8
watchTowr (@watchtowrcyber) 's Twitter Profile Photo

We’re expanding the phorce globally - and within watchTowr Labs, we’re always hiring. We’re looking for hands on skills, drive, aggression and most importantly: a passion to hack the planet. We’ll ignore your certs. If you fit the prophile, you’ll figure out how to contact us.

We’re expanding the phorce globally - and within watchTowr Labs, we’re always hiring. We’re looking for hands on skills, drive, aggression and most importantly: a passion to hack the planet. 

We’ll ignore your certs. If you fit the prophile, you’ll figure out how to contact us.
Haidar (@haider_kabibo) 's Twitter Profile Photo

IPC 6 is live; RPC 5; RPC Security 3. In this part, I discussed how to secure RPC endpoints and the RPC runtime system policy. The final part of the first wave of IPC will be next, where I will talk about tooling in RPC research. sud0ru.ghost.io/windows-inter-…

那个饺子🦆(JJ) (@thatjiaozi) 's Twitter Profile Photo

As promised Blogpost is here! I find that a lot of the times people ask “how can researchers find complex bugs” This is my small contribution to show how the journey looked for me. I presented this content at hitcon last week! bughunters.google.com/blog/580034147…