Ange (@angealbertini) 's Twitter Profile
Ange

@angealbertini

Reverse engineer, file formats expert.
Corkami, CPS2Shock, PoC||GTFO, Sha1tered, Magika...
Security engineer @ Google. He/him.

ID: 26000458

linkhttp://www.corkami.com calendar_today23-03-2009 13:32:02

28,28K Tweet

24,24K Followers

904 Following

PagedOut (@pagedout_zine) 's Twitter Profile Photo

Paged Out! #6 has arrived! And it's jam-packed with content! You can download it here: pagedout.institute/?page=issues.p…

Gynvael Coldwind (@gynvael.bsky.social) (@gynvael) 's Twitter Profile Photo

Doing a free webinar today at 8PM CEST (i.e. livestream with slides) about "files", as entities on the filesystem, seen through the eyes of a security researcher. hexarcana.ch/lp/files/ ← sign up here if interested

Ange (@angealbertini) 's Twitter Profile Photo

The craziest file I made & visualized recently was combining the Doom PDF with a DOS & Windows (EXE & PE) polyglot. It runs Doom on OS from 1993 until today, and Chrome-based PDF viewers! You can make it an HTML/JS polyglot too to run on most browsers! (3/3)

The craziest file I made & visualized recently was combining the Doom PDF with a DOS & Windows (EXE & PE) polyglot.
It runs Doom on OS from 1993 until today, and Chrome-based PDF viewers!
You can make it an HTML/JS polyglot too to run on most browsers! (3/3)
Ange (@angealbertini) 's Twitter Profile Photo

"Polyglot files are unnatural and never existed in the wild", they say. Aperture cards are punched cards with a microfiche, indexing 'analogue' images with punched cards data on the same medium. A standard polyglot document IRL defined in the 1960s.

"Polyglot files are unnatural and never existed in the wild", they say.

Aperture cards are punched cards with a microfiche, indexing 'analogue' images with punched cards data on the same medium.
A standard polyglot document IRL defined in the 1960s.
Łukasz | Wookash Podcast (@wookash_podcast) 's Twitter Profile Photo

This must've been the most technical discussion so far. Stewart Lynch singlehandedly developed 10x Editor - code editor for large (+5M lines) projects. The editor itself has 0.5M lines of code and Stewart is handling it just fine. He developed FastFind (file search plugin for

Ange (@angealbertini) 's Twitter Profile Photo

QQ: what's your favorite PDF analysis tool [for malicious files or 'standard' ones]? (besides peepdf / Stevens' PDF parser+id / VeraPDF)

Silent (@__silent_) 's Twitter Profile Photo

New blog post! A bug in GTA San Andreas lay dormant for over 20 years, until unrelated changes in Windows 11 24H2 triggered it. This is a deep dive into how a simple coding mistake erased all seaplanes from the game and made them completely unusable. cookieplmonster.github.io/2025/04/23/gta…

Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

Corkami Your work is so important as it introduces new hackers to hacking file formats. I found it invaluable when doing my PDF research a few years ago. Thank you for putting so much effort into making file formats beautiful!

Furrtek (@furrtek) 's Twitter Profile Photo

Now that a few years have passed, I regret not having followed : RetroHQ :'s advice about not releasing ready-to-use source files of commercial projects. ... 1/4

Erik Pistelli (@erikpistelli) 's Twitter Profile Photo

🚨 WARNING: A fake domain—cff-explorer[.]com—has been registered to distribute malware. It currently appears as the top Google result when searching for "CFF Explorer". The only legitimate domain is ntcore.com.

Jiří Vinopal (@vinopaljiri) 's Twitter Profile Photo

[1/4] Have you ever seen a malware sample with a weird—maybe even future—PE timestamp? ➡️ Is it a .NET app? I recently saw some research publications labeled as "timestomped"...but that’s wrong. 🧠 It’s probably just a deterministic/repro build 🔍 Watch this video for a quick

Octoberfest7 (@octoberfest73) 's Twitter Profile Photo

x86matthew's old "Embedding an EXE within a LNK" research came to mind again and I spent a bit playing with .ZIP instead. I found that you can smuggle extra data inbetween the file data and .ZIP's central directory which won't display + can be extracted with powershell

<a href="/x86matthew/">x86matthew</a>'s old "Embedding an EXE within a LNK" research came to mind again and I spent a bit playing with .ZIP instead. I found that you can smuggle extra data inbetween the file data and .ZIP's central directory which won't display + can be extracted with powershell
Ange (@angealbertini) 's Twitter Profile Photo

I had a minor printing problem with an article where the last few letters of the longest lines of text were missing. It was a small mental puzzle every 5-10 lines to guess the missing letters. An interesting exercise to stay focused throughout the article.