
DEVCORE
@d3vc0r3
Cyber Red Team in Taiwan
ID: 2343289008
http://devco.re 14-02-2014 08:36:54
104 Tweet
3,3K Followers
0 Following

#POC2024 kicks off this week! ๐ Catch Pumpkin (Pumpkin ๐)โs debut talk on his breakthrough exploitation technique from #Pwn2OwnVancouver2024: "How I use a novel approach to exploit a limited OOB on Ubuntu at Pwn2Own Vancouver 2024". #VulnerabilityResearch #Ubuntu #CyberSecurity


This month, Orange Tsai ๐ and splitline ๐๏ธ๐โโฌ revealed a new attack surface at #BHEU, uncovering Windows's deepest Unicode Transformer with wide impacts on well-known applications and OSS projects. Explore the pre-release site while we prepare the full blog: worst.fit



๐คCongrats Orange(Orange Tsai ๐) and Splitline(splitline ๐๏ธ๐โโฌ) on making it to 2024 Top 10 Web Hacking Techniques! Check out their groundbreaking research: portswigger.net/research/top-1โฆ






Our first confirmation of #Pwn2Own Berlin! Pumpkin (Pumpkin ๐) from DEVCORE Research Team used an integer overflow to escalate privs on Red Hat Linux. He earns $20,000 and 2 Master of Pwn points. #P2OBerlin





#Ubuntuโs new AppArmor-based sandbox aimed to limit untrusted access to user namespaces & io_uring. But it wasnโt foolproof. Pumpkin (Pumpkin ๐)โs latest blog shows how he bypassed itโcovering the issue, technical details & reporting process. devco.re/blog/2025/06/2โฆ #Linux



Thanks PortSwigger and Bug Bounty Village for this awesome event โ and also to my DEVCORE buddies for standing on stage to collect the trophy for me! A little follow-up article on this research is coming soon... stay tuned! ๐ค


Congrats to Orange (Orange Tsai ๐) for making PortSwiggerโs Top 10 Web Hacking Techniques again โ and to splitline (splitline ๐๏ธ๐โโฌ) for the debut. #1 Confusion Attacks โ Apache HTTP Server devco.re/blog/2024/08/0โฆ #4 WorstFit โ Windows ANSI devco.re/blog/2025/01/0โฆ #DEFCON
