McCaulay (@_mccaulay) 's Twitter Profile
McCaulay

@_mccaulay

Senior Security Researcher | OSCP | CRT | Pwn2Own

ID: 1268890167919681541

linkhttps://mccaulay.co.uk/ calendar_today05-06-2020 12:59:35

338 Tweet

3,3K Followers

192 Following

David Kennedy (@cyb3rc3lt) 's Twitter Profile Photo

Anyone else spot that linpeas.sh is looking to extract information from your system? This site is not linked to the original author's version of Linpeas by the way.

Anyone else spot that linpeas.sh is looking to extract information from your system? 

This site is not linked to the original author's version of Linpeas by the way.
V4bel (@v4bel) 's Twitter Profile Photo

I just released our kernelCTF VSock 0-day write-up with qwerty . (exp196/exp197, CVE-2024-50264) github.com/google/securit… We made history by being the first to exploit VSock in kernelCTF, expanding its known attack vectors. 🄳 It’s a pretty *simple* race condition, right?

I just released our kernelCTF VSock 0-day write-up with <a href="/_qwerty_po/">qwerty</a> . (exp196/exp197, CVE-2024-50264)
github.com/google/securit…

We made history by being the first to exploit VSock in kernelCTF, expanding its known attack vectors. 🄳

It’s a pretty *simple* race condition, right?
McCaulay (@_mccaulay) 's Twitter Profile Photo

An interesting heap emulation technique to exploit the (not yet banned in the US) TP-Link Archer AX21 Router nccgroup.com/uk/research-bl…

An interesting heap emulation technique to exploit the (not yet banned in the US) TP-Link Archer AX21 Router nccgroup.com/uk/research-bl…
msm (@msmcode) 's Twitter Profile Photo

šŸš€Excited to announce ghidralib - a library that makes #Ghidra scripts drastically shorter and easier to write. I've been using it daily for #reverseengineering and decided it’s time to share! Check it out: github.com/msm-code/ghidr… And the docs: msm-code.github.io/ghidralib/ #infosec

šŸš€Excited to announce ghidralib - a library that makes #Ghidra scripts drastically shorter and easier to write. I've been using it daily for #reverseengineering and decided it’s time to share! Check it out: github.com/msm-code/ghidr… And the docs: msm-code.github.io/ghidralib/ #infosec
Alex Plaskett (@alexjplaskett) 's Twitter Profile Photo

Happy to be speaking here with McCaulay. We are going to be discussing our Pioneer IVI p2o chain all the way from hardware attacks, software remote exploit and developing tooling to track users and extract data from the unit!

Zion Leonahenahe Basque (@mahal0z) 's Twitter Profile Photo

It's finally here! Ghidra 11.3 dropped with built-in support for Python 3 through Pyhidra. Let's go! github.com/NationalSecuri…

SinSinology (@sinsinology) 's Twitter Profile Photo

šŸ”„šŸ’€My Advanced .NET Exploitation training is now open for register! bit.ly/4hwNFyM 32-hours of intense .NET exploitation (PoC||GTFO) We'll be exploiting 15+ remote code execution chains (25 bugs in total) 🪲 I’d truly appreciate your support, your RT would mean a lot!šŸ™

šŸ”„šŸ’€My Advanced .NET Exploitation training is now open for register! bit.ly/4hwNFyM
32-hours of intense .NET exploitation (PoC||GTFO)
We'll be exploiting 15+ remote code execution chains (25 bugs in total) 🪲
I’d truly appreciate your support, your RT would mean a lot!šŸ™
Insomni'hack (@1ns0mn1h4ck) 's Twitter Profile Photo

✨Ready for Insomni’hack 2025? Don’t miss Alex Plaskett & McCaulay Hudson’s insightful session, "Pioneering zero days at Pwn2Own Automotive 2024". šŸ‘©ā€šŸ’» Details & registration: insomnihack.ch/talks/pioneeri… #INSO25 #Cybersecurity #EthicalHacking #Switzerland

✨Ready for Insomni’hack 2025? Don’t miss Alex Plaskett &amp; McCaulay Hudson’s insightful session, "Pioneering zero days at Pwn2Own Automotive 2024".

šŸ‘©ā€šŸ’» Details &amp; registration: insomnihack.ch/talks/pioneeri…

#INSO25 #Cybersecurity #EthicalHacking #Switzerland
Andrey Konovalov (@andreyknvl) 's Twitter Profile Photo

Looks like we have a confirmation that Cellebrite uses memory corruptions in Linux kernel USB drivers to unlock Android phones. First 2 bugs seem easily discoverable by syzkaller/syzbot with a bit of extra descriptions. 3rd one is likely as well ā¤µļø

NCC Group Research & Technology (@nccgroupinfosec) 's Twitter Profile Photo

NCC Group EDG Alex Plaskett and McCaulay will present Pioneering Zero Days at Pwn2Own Automotive 2024 where they will describe their Pioneer Pwn2Own chain and demonstrate a proof-of-concept vehicle spyware implant

NCC Group EDG <a href="/alexjplaskett/">Alex Plaskett</a> and <a href="/_mccaulay/">McCaulay</a> will present Pioneering Zero Days at Pwn2Own Automotive 2024 where they will describe their Pioneer Pwn2Own chain and demonstrate a proof-of-concept vehicle spyware implant
SinSinology (@sinsinology) 's Twitter Profile Photo

"Advanced .NET Exploitation" June edition at REcon is confirmed! We've hit 10 registered students, so the class is happening for sure. If you’ve been thinking about joining, there’s 5 more space to learn some deserialization Magic! summoning.team

SinSinology (@sinsinology) 's Twitter Profile Photo

Launching a student-only free workshop: ".NET Exploitation Basics" 🪲 If you're a student (or know one), let's write some deserialization exploits, Manchester, July 12. 10 seats. summoning.team/free-training-…

Launching a student-only free workshop: ".NET Exploitation Basics" 🪲
If you're a student (or know one), let's write some deserialization exploits, Manchester, July 12. 
10 seats.
summoning.team/free-training-…
Rio (@0x09al) 's Twitter Profile Photo

Oh you thought surprises were over for BSides Tirana 2025 ? This year, we’re bringing Sina Kheirkhah - Pwn2Own "Master of Pwn" (SinSinology) to run a full-day workshop on Advanced .NET Exploitation based on his course that normally goes for €4,000. He’s been kind enough to

Oh you thought surprises were over for <a href="/BSidesTirana/">BSides Tirana</a> 2025 ?

This year, we’re bringing Sina Kheirkhah - Pwn2Own "Master of Pwn"
(<a href="/SinSinology/">SinSinology</a>) to run a full-day workshop on Advanced .NET Exploitation based on his course that normally goes for €4,000.

He’s been kind enough to
RET2 Systems (@ret2systems) 's Twitter Profile Photo

What does it take to hack a Sonos Era 300 for Pwn2Own? Take a look at our process of adapting existing research, establishing a foothold, and exploiting media parsers for unauthenticated RCE over the networkšŸ”„šŸ‘‡ blog.ret2.io/2025/06/11/pwn…

What does it take to hack a <a href="/Sonos/">Sonos</a> Era 300 for Pwn2Own? 

Take a look at our process of adapting existing research, establishing a foothold, and exploiting media parsers for unauthenticated RCE over the networkšŸ”„šŸ‘‡

blog.ret2.io/2025/06/11/pwn…
McCaulay (@_mccaulay) 's Twitter Profile Photo

Breaking down ā€˜EchoLeak’, the First Zero-Click AI Vulnerability Enabling Data Exfiltration from Microsoft 365 Copilot by Aim Labs - aim.security/lp/aim-labs-ec…