Fabio (@degrigis) 's Twitter Profile
Fabio

@degrigis

Computer Security PhD student@UCSB Seclab | Binary tamer | hacking@shellphish

ID: 1115409841

calendar_today23-01-2013 22:09:18

387 Tweet

515 Followers

605 Following

Fabio (@degrigis) 's Twitter Profile Photo

Trying to get some insights for a research idea: does anyone know how concerning is the problem of "salmonella checks" in the MEV searching community? I know concrete TX simulation is a (partial) solution, but...

Fabio (@degrigis) 's Twitter Profile Photo

Very interesting piece from Gynvael Coldwind. I have been crystalizing the same conclusions in the past few years. gynvael.coldwind.pl/?id=791 Although, personally I still think that there are many incentives to learn the craft. Maybe I'll write a longer post later :)

Moxie Marlinspike (@moxie) 's Twitter Profile Photo

This could get crazy if true. Telegram messages are not encrypted. France is trying to arrest the CEO of a Russian team that has plaintext access to every message the French president has ever sent or received.. ā€œMacron has been a Telegram user sinceā€¦ā€ politico.eu/article/telegr…

Peter Kraft (@petereliaskraft) 's Twitter Profile Photo

What happens if your CPU gets something wrong? If it wakes up one day and decides 2+2=5? Well, most of us will never have to worry about that. But if you work at a company the size of Google, you do, which is why this paper on "mercurial cores" is so fascinating. What the

What happens if your CPU gets something wrong? If it wakes up one day and decides 2+2=5?

Well, most of us will never have to worry about that. But if you work at a company the size of Google, you do, which is why this paper on "mercurial cores" is so fascinating.

What the
Arvind (@0xdnivra) 's Twitter Profile Photo

Excited to share that I'll be presenting our work (arvindsraj.com/publication/20…) about finding future vulnerabilities using fuzzing at CCS this week. 🧵 1/6

Excited to share that I'll be presenting our work (arvindsraj.com/publication/20…) about finding future vulnerabilities using fuzzing at CCS this week. 🧵 1/6
V4bel (@v4bel) 's Twitter Profile Photo

Google kernelCTF LTS/COS 0-day WIN! Successfully exploited an extremely complex race condition 0-day vuln on two instances without using namespaces šŸŽ‰ work with qwerty

Google kernelCTF LTS/COS 0-day WIN!

Successfully exploited an extremely complex race condition 0-day vuln on two instances without using namespaces šŸŽ‰

work with <a href="/_qwerty_po/">qwerty</a>
Fabio (@degrigis) 's Twitter Profile Photo

I have been trying bluesky for a few days: Way different feeling than being on X for the last few months. You can find me here bsky.app/profile/degrig… šŸ¦‹

V4bel (@v4bel) 's Twitter Profile Photo

I just released our kernelCTF VSock 0-day write-up with qwerty . (exp196/exp197, CVE-2024-50264) github.com/google/securit… We made history by being the first to exploit VSock in kernelCTF, expanding its known attack vectors. 🄳 It’s a pretty *simple* race condition, right?

I just released our kernelCTF VSock 0-day write-up with <a href="/_qwerty_po/">qwerty</a> . (exp196/exp197, CVE-2024-50264)
github.com/google/securit…

We made history by being the first to exploit VSock in kernelCTF, expanding its known attack vectors. 🄳

It’s a pretty *simple* race condition, right?
Wil Gibbs (@cl4sm) 's Twitter Profile Photo

Don’t miss lukas and I’s talk about Shellphish’s Cyber Reasoning System ARTIPHISHELL which took 5th place in DARPAā€˜s AIxCC Competition at HITCON on the 15th!

Don’t miss <a href="/dreselli/">lukas</a> and I’s talk about <a href="/shellphish/">Shellphish</a>’s Cyber Reasoning System ARTIPHISHELL which took 5th place in <a href="/DARPA/">DARPA</a>ā€˜s AIxCC Competition at <a href="/HacksInTaiwan/">HITCON</a> on the 15th!