SummoningTeam (@summoningteam) 's Twitter Profile
SummoningTeam

@summoningteam

Independent Security Research Team managed by @SinSinology

ID: 1586289923992207360

linkhttps://summoning.team calendar_today29-10-2022 09:33:01

89 Tweet

564 Followers

2 Following

Cyber Saiyan | RomHack Conference, Training, Camp (@cybersaiyanit) 's Twitter Profile Photo

#RomHack2025 #Training we’re hosting Advanced .NET #Exploitation Training with SinSinology Instead of spending 8 months of your time, you will be up to date with the latest tools, techniques, tactics, and procedures in just 4 days! romhack.io/training/2025/…

#RomHack2025 #Training we’re hosting Advanced .NET #Exploitation Training with <a href="/SinSinology/">SinSinology</a>
Instead of spending 8 months of your time, you will be up to date with the latest tools, techniques, tactics, and procedures in just 4 days!

romhack.io/training/2025/…
SinSinology (@sinsinology) 's Twitter Profile Photo

🚨In the upcoming September edition of "Advanced NET Exploitation" at Cyber Saiyan | RomHack Conference, Training, Camp 2025, we'll review the SharePoint p2o Deserialization exploit that was found by the Legend Khoa Dinh himself 🔥 P.S: for the love of god, register NOW! 😅

🚨In the upcoming September edition of "Advanced NET Exploitation" at <a href="/cybersaiyanIT/">Cyber Saiyan | RomHack Conference, Training, Camp</a> 2025, we'll review the SharePoint p2o Deserialization exploit that was found by the Legend <a href="/_l0gg/">Khoa Dinh</a> himself 🔥
P.S: for the love of god, register NOW! 😅
TheZDIBugs (@thezdibugs) 's Twitter Profile Photo

[ZDI-25-628|CVE-2025-25271] (Pwn2Own) Phoenix Contact CHARX SEC-3150 OCPP Authentication Bypass Vulnerability (CVSS 3.1; Credit: Sina Kheirkhah (SinSinology) of Summoning Team (SummoningTeam)) zerodayinitiative.com/advisories/ZDI…

watchTowr (@watchtowrcyber) 's Twitter Profile Photo

we grew up in #phrack - so a huge thank you to our friends @ Phrack Staff for offering us the privilege to be on the back cover of Phrack 72. Did the scene die? Who knows ;-)

we grew up in #phrack - so a huge thank you to our friends @ Phrack Staff for offering us the privilege to be on the back cover of Phrack 72.

Did the scene die? Who knows ;-)
SinSinology (@sinsinology) 's Twitter Profile Photo

only 3 seats left for the "Advanced .NET Exploitation" September edition at RomHack (Cyber Saiyan | RomHack Conference, Training, Camp), come on lads, make it happen, wanna go brag about selling out 😅 grab your seat 🪑 🪑 🪑 summoning.team

BSides Tirana (@bsidestirana) 's Twitter Profile Photo

It’s happening today Advanced .NET Exploitation hosted by Sina Kheirkhah - Pwn2Own "Master of Pwn" (SinSinology - x.com/SinSinology) 🔥🔥🔥 #workshop #BSidesTirana #PyramidofTirana

It’s happening today Advanced .NET Exploitation hosted by Sina Kheirkhah - Pwn2Own "Master of Pwn" (<a href="/SinSinology/">SinSinology</a> - x.com/SinSinology) 🔥🔥🔥 

#workshop #BSidesTirana #PyramidofTirana
SinSinology (@sinsinology) 's Twitter Profile Photo

Spent the weekend teaching my "Basic .NET Exploitation workshop" at BSides Tirana (BSides Tirana), and wow, what an experience! Massive shoutout to Rio (Rio) & Paulina (Paulina Cakalli ) for organizing hands-down the best BSides I've ever been part of 💜🔥 Here are some of

Spent the weekend teaching my "Basic .NET Exploitation workshop" at BSides Tirana (<a href="/BSidesTirana/">BSides Tirana</a>), and wow, what an experience! Massive shoutout to Rio (<a href="/0x09AL/">Rio</a>) &amp; Paulina (<a href="/CakalliPaulina/">Paulina Cakalli</a> ) for organizing hands-down the best BSides I've ever been part of 💜🔥

Here are some of
SinSinology (@sinsinology) 's Twitter Profile Photo

Getting feedback like this makes it all worth it! 💜 Just finished teaching 4 days (32 hrs) of "Advanced .NET Exploitation" at RomHack (Cyber Saiyan | RomHack Conference, Training, Camp) 15 brilliant students, 16 CVEs, and plenty of pop-calc moments. See you in the next one... (to be anounced)

Getting feedback like this makes it all worth it! 💜
Just finished teaching 4 days (32 hrs) of "Advanced .NET Exploitation" at RomHack (<a href="/cybersaiyanIT/">Cyber Saiyan | RomHack Conference, Training, Camp</a>) 15 brilliant students, 16 CVEs, and plenty of pop-calc moments.

See you in the next one... (to be anounced)
esjay (@esj4y) 's Twitter Profile Photo

Thanks SinSinology for the .NET exploitation training! Appreciate the effort you put into the slides, lab-guide and the VM! It was great fun and I loved the fact that it had plenty of real world targets/CVEs.

Thomas Forrer (@u238ironsider) 's Twitter Profile Photo

SinSinology thank you so much for the .NET advanced exploitation training.. you gave a lot of awesome insights and tricks, I would recommend it to everyone that is interested in taking their exploitation skills to the next level!

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Want to watch #Pwn2Own but can't make it to Ireland? Join one of the live streams! Tues 1400 - STAR Labs SG vs Sonos Era 300 youtube.com/live/3oAs5hzH9… Wed 1400 - SummoningTeam vs Samsung Galaxy youtube.com/live/LuzHcXruJ… 1600 - Tri vs Samsung Galaxy

Trend Micro (@trendmicro) 's Twitter Profile Photo

Seconds to spare and $40,000 on the line: SinSinology of SummoningTeam and the @theZDI team celebrate his successful exploit of Synology DiskStation DS925+ in the Network Attached Storage category at Pwn2Own Ireland. trendmicro.com/en_us/zero-day… #Pwn2Own

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

🏡 McCaulay Hudson (McCaulay) of SummoningTeam just cracked Home Assistant Green wide open! (and it still isn't green) Smart homes beware. He's off to the disclosure room to explain himself. #Pwn2Own

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

We have our 1st bug collision of #Pwn2Own Ireland. McCaulay Hudson (McCaulay) of Summoning Team (SummoningTeam) successfully exploited the Home Assistant Green with 4 bugs - 1 unique SSRF and 3 collisions. They still earn $12,500 and 2.5 Master of Pwn points. #P2OIreland

We have our 1st bug collision of #Pwn2Own Ireland. McCaulay Hudson (<a href="/_mccaulay/">McCaulay</a>) of Summoning Team (<a href="/SummoningTeam/">SummoningTeam</a>) successfully exploited the Home Assistant Green with 4 bugs - 1 unique SSRF and 3 collisions. They still earn $12,500 and 2.5 Master of Pwn points. #P2OIreland