Thach Nguyen Hoang 🇻🇳 (@hi_im_d4rkn3ss) 's Twitter Profile
Thach Nguyen Hoang 🇻🇳

@hi_im_d4rkn3ss

Security Researcher @starlabs_sg. Pwn2Own Mobile 2020, 2021, 2022, 2023. Pwn2Own Vancouver 2022, 2023, 2024.

ID: 1108628272558956545

calendar_today21-03-2019 07:15:52

885 Tweet

2,2K Followers

314 Following

Dimitri Fourny (@dimitrifourny) 's Twitter Profile Photo

My V8 vulnerability CVE-2019-5790 is now public (Heap buffer overflow in the V8 language parser) bugs.chromium.org/p/chromium/iss…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

We've updated our blog on abusing file deletes to escalate privileges. We've also released PoC to demonstrate this. The exploit offers a high degree of reliability and eliminates all race conditions. It has been tested on the latest Windows 11 Enterprise. zerodayinitiative.com/blog/2022/3/16…

hackyboiz (@hackyboiz) 's Twitter Profile Photo

[Research] Hyper-V 1-day Class: CVE-2024-38127 이번 연구글도 Hyper-V LPE 취약점 분석입니다. CVE-2024-38127의 patch diffing, poc에 대해 다루었습니다 🧐 hackyboiz.github.io/2024/09/15/pwn…

Sam Curry (@samwcyo) 's Twitter Profile Photo

New writeup from ꙅɿɘƚɔɘqꙅ and I: we're finally allowed to disclose a vulnerability reported to Kia which would've allowed an attacker to remotely control almost all vehicles made after 2013 using only the license plate. Full disclosure: samcurry.net/hacking-kia

VR|XD Community (@zerodaylinks) 's Twitter Profile Photo

[Browser Exploitation] Insightful little analysis of v8 CVE-2024-7965: bi.zone/eng/expertise/… PoC: github.com/bi-zone/CVE-20… Logic bug in Turbofan's "sea of nodes" IR implementation allows for OOB array access! Exploit in-the-wild reported by Google & CISA on 26th August 2024

sakura (@eternalsakura13) 's Twitter Profile Photo

My first V8 sandbox bypass vulnerability has been fixed, and I will continue to discover more. chromium.googlesource.com/v8/v8.git/+/7f…

starlabs (@starlabs_sg) 's Twitter Profile Photo

🎄 All I Want for Christmas is a CVE-2024-30085 Exploit 🎄 As always, we at starlabs are sharing what we learnt. This time, it's brought to you by Cherie-Anne Lee starlabs.sg/blog/2024/all-…

Xion (@0x10n) 's Twitter Profile Photo

The most elegant V8 Wasm Turboshaft typer exploit that I've reported. This primitive converts **any** Wasm type confusion in **any type hierarchy** into fully controlled arbitrary type confusion - e.g. what happens if you type `null : ref extern`? RCE :) crbug.com/372269618

xvonfers (@xvonfers) 's Twitter Profile Photo

[$20000](CVE-2024-12693)[382190919][maglev]Array OOB access in the maglev phi untaggingoptimization is now open with PoC: issues.chromium.org/issues/3821909… Wow... A very detailed report, I recommend it to those who are interested in how v8 works, and especially maglev.

[$20000](CVE-2024-12693)[382190919][maglev]Array OOB access in the maglev phi untaggingoptimization is now open with PoC: 
issues.chromium.org/issues/3821909…

Wow...
A very detailed report, I recommend it to those who are interested in how v8 works, and especially maglev.
kind_killerwhale (@kind_k11rwhale) 's Twitter Profile Photo

A deep dive into the core IR components of Fuzzilli, focusing on Analyzer.swift, Blocks.swift, and Context.swift. This post kicks off a series exploring the internal structure of Fuzzilli's IR. rpc.kr/posts/fuzzilli…

kind_killerwhale (@kind_k11rwhale) 's Twitter Profile Photo

Part 2 of the Fuzzilli IR series explores Opcodes.swift, Operation.swift, Program.swift, and Variable.swift. With the groundwork complete, the next post dives into the core of the IR engine. rpc.kr/posts/fuzzilli…

Angelboy (@scwuaptx) 's Twitter Profile Photo

Thrilled to share our latest deep dive into Windows Kernel Streaming! Just presented this research at offensivecon. Check it out: devco.re/blog/2025/05/1…

xvonfers (@xvonfers) 's Twitter Profile Photo

A toolkit to turn Chromium vulnerabilities into full-chain exploits github.com/Petitoto/chrom… From BSidesLuxembourg 2025 "Browser Exploitation: From N-Days to Real-World Exploit Chains in Google Chrome" pretalx.com/bsidesluxembou…