itszn (@itszn13) 's Twitter Profile
itszn

@itszn13

Amy | Security researcher | stackchk.fail/ctf.txt | bsky: nyanbox.stackchk.fail |
LLM ART: bsky.app/profile/altern…

ID: 320851335

linkhttps://ret2.io/ calendar_today20-06-2011 16:46:39

1,1K Tweet

9,9K Followers

693 Following

itszn (@itszn13) 's Twitter Profile Photo

Using thebes control vector library to backdoor a model so that it introduces command injection vulnerabilities rather than using safer subprocess methods

Using <a href="/voooooogel/">thebes</a> control vector library to backdoor a model so that it introduces command injection vulnerabilities rather than using safer subprocess methods
thebes (@voooooogel) 's Twitter Profile Photo

.itszn has opened a PR to ollama to add support for cvecs, including hitting steered models via API. not merged yet but you can pull the PR down and use it now if you're interested in this functionality! link to PR below.

.<a href="/itszn13/">itszn</a> has opened a PR to <a href="/ollama/">ollama</a> to add support for cvecs, including hitting steered models via API. not merged yet but you can pull the PR down and use it now if you're interested in this functionality! link to PR below.
Filip Jerzy Pizło (@filpizlo) 's Twitter Profile Photo

This is what I mean by Fil-C being memory safe. On the left, quickjs from 2019-07-09 compiled with GCC (i.e. Yolo-C) running Christopher Argüelle's exploit. Exploit works. On the right, same quickjs compiled with Fil-C running the same exploit. Memory safety error caught! According to

This is what I mean by Fil-C being memory safe.

On the left, quickjs from 2019-07-09 compiled with GCC (i.e. Yolo-C) running <a href="/itszn/">Christopher Argüelle</a>'s exploit. Exploit works.

On the right, same quickjs compiled with Fil-C running the same exploit. Memory safety error caught! According to
RE//verse (@reverseconf) 's Twitter Profile Photo

Our 2025 RE//verse talk schedule is now live! Talks start Friday, but don't forget to check the Thursday schedule and arrive early enough for the kick-off event! re-verse.io/schedule.html?…

RE//verse (@reverseconf) 's Twitter Profile Photo

Our first video from RE//verse 2025 is live! Part journey of personal discovery, part technical deep-dive, this presentation from Markus Gaasedelen was the highest rated in the feedback survey and is a must-see talk: youtu.be/hGlIkgmhZvc

RET2 Systems (@ret2systems) 's Twitter Profile Photo

Be ambitious, do absurd things. Full-stack Reverse Engineering of the Original Microsoft Xbox from the inaugural RE//verse (2025) is now available to stream on YouTube. Watch it here: youtube.com/watch?v=hGlIkg…

Be ambitious, do absurd things. Full-stack Reverse Engineering of the Original Microsoft Xbox from the inaugural <a href="/REverseConf/">RE//verse</a> (2025) is now available to stream on YouTube.

Watch it here: youtube.com/watch?v=hGlIkg…
RET2 Systems (@ret2systems) 's Twitter Profile Photo

New blogpost! Want to see how we exploited Synology Inc. network-attached-storage devices at Pwn2Own Ireland? RCE to root via out-of-bounds NULL-byte writes, click the embed for a fun little writeup of CVE-2024-10442 🔎🎉 blog.ret2.io/2025/04/23/pwn…

itszn (@itszn13) 's Twitter Profile Photo

Anyone know if there is a "official" name for this semi-fractal? It's like a soap-bubble version of the Sierpinski triangle It was generated though fuzzing deterministic cellular automata rules (via AFL++ against the JXL file decoder library)

Anyone know if there is a "official" name for this semi-fractal? It's like a soap-bubble version of the Sierpinski triangle

It was generated though fuzzing deterministic cellular automata rules (via AFL++ against the JXL file decoder library)
Zion Leonahenahe Basque (@mahal0z) 's Twitter Profile Photo

I'm proud to announce that myself and Ati Priya Bajaj have created the Workshop on Software Understanding and Reverse Engineering (SURE), which will be co-located at CCS 2025. sure-workshop.org Please follow our workshop account ACM SURE Workshop and RT it for visibility :).

RET2 Systems (@ret2systems) 's Twitter Profile Photo

What does it take to hack a Sonos Era 300 for Pwn2Own? Take a look at our process of adapting existing research, establishing a foothold, and exploiting media parsers for unauthenticated RCE over the network🔥👇 blog.ret2.io/2025/06/11/pwn…

What does it take to hack a <a href="/Sonos/">Sonos</a> Era 300 for Pwn2Own? 

Take a look at our process of adapting existing research, establishing a foothold, and exploiting media parsers for unauthenticated RCE over the network🔥👇

blog.ret2.io/2025/06/11/pwn…