Kiddo (@kiddo_pwn) 's Twitter Profile
Kiddo

@kiddo_pwn

Pwn2Own {24: 🇮🇪 / 25: 🏎️} | Vulnerability researcher @stealien

ID: 1284947583262011392

calendar_today19-07-2020 20:25:58

104 Tweet

868 Followers

358 Following

xvonfers (@xvonfers) 's Twitter Profile Photo

😅 Exploit chain: CVE-2024-12053 + 361862752(rce + v8sbx escape), exploited ITW issues.chromium.org/issues/3790091… issues.chromium.org/issues/3618627…

😅
Exploit chain: CVE-2024-12053 + 361862752(rce + v8sbx escape), exploited ITW
issues.chromium.org/issues/3790091…
issues.chromium.org/issues/3618627…
Kiddo (@kiddo_pwn) 's Twitter Profile Photo

Thanks to TyphoonCon🌪️ and sponsor’s support, I'm able to attend again this year 🥰 Looking forward to learning a lot and meeting amazing people at the conference!

Thanks to <a href="/typhooncon/">TyphoonCon🌪️</a> and sponsor’s support, I'm able to attend again this year 🥰 

Looking forward to learning a lot and meeting amazing people at the conference!
SinSinology (@sinsinology) 's Twitter Profile Photo

"Advanced .NET Exploitation" June edition at REcon is confirmed! We've hit 10 registered students, so the class is happening for sure. If you’ve been thinking about joining, there’s 5 more space to learn some deserialization Magic! summoning.team

Kiddo (@kiddo_pwn) 's Twitter Profile Photo

This year's TyphoonCon🌪️ was the best! I was grateful to make new friends and learn so much from them 🥰 If you’re looking to use Binary Ninja more efficiently, I'd highly recommend Kyle Martin's upcoming training! (2nd pic) In my experience, he’s one of the top who can help us

starlabs (@starlabs_sg) 's Twitter Profile Photo

After 6 months of responsible disclosure, proud to announce our team discovered 13 (mostly exploitable) vulnerabilities in Samsung Exynos processors! Kudos to Billy, Ramdhan, [email protected] & rainbowpigeon CVE-2025-23095 to CVE-2025-23107 📍 semiconductor.samsung.com/support/qualit…

RET2 Systems (@ret2systems) 's Twitter Profile Photo

What does it take to hack a Sonos Era 300 for Pwn2Own? Take a look at our process of adapting existing research, establishing a foothold, and exploiting media parsers for unauthenticated RCE over the network🔥👇 blog.ret2.io/2025/06/11/pwn…

What does it take to hack a <a href="/Sonos/">Sonos</a> Era 300 for Pwn2Own? 

Take a look at our process of adapting existing research, establishing a foothold, and exploiting media parsers for unauthenticated RCE over the network🔥👇

blog.ret2.io/2025/06/11/pwn…
TheZDIBugs (@thezdibugs) 's Twitter Profile Photo

[ZDI-25-376|CVE-2025-23118] (Pwn2Own) Ubiquiti Networks AI Bullet Improper Certificate Validation Authentication Bypass Vulnerability (CVSS 7.5; Credit: Kiddo, @d0now, @insp3ct0r_x, Wonbeen Im, @leeju_04, JuYeong Lee, @nang__lam, slyfizz of STEALIEN Inc.) zerodayinitiative.com/advisories/ZDI…

TheZDIBugs (@thezdibugs) 's Twitter Profile Photo

[ZDI-25-377|CVE-2025-23119] (Pwn2Own) Ubiquiti Networks AI Bullet Improper Neutralization of Escape Sequences Authentication Bypass Vulnerability (CVSS 7.5; Credit: Kiddo, @d0now, @insp3ct0r_x, Wonbeen Im, @leeju_04, JuYeong Lee, @nang__lam, slyfizz) zerodayinitiative.com/advisories/ZDI…

Stephen Fewer (@stephenfewer) 's Twitter Profile Photo

Today Rapid7 is disclosing 8 new printer vulnerabilities affecting 742 models across 4 vendors. After 13 months of coordinated disclosure with Brother Industries, Ltd, we're detailing all issues including a critical auth bypass. Full details here: rapid7.com/blog/post/mult…

Pumpkin 🎃 (@u1f383) 's Twitter Profile Photo

A bit late, but I just published my blog post on bypassing Ubuntu’s sandbox! Hope you enjoy it! u1f383.github.io/linux/2025/06/…