
Kiddo
@kiddo_pwn
Pwn2Own {24: 🇮🇪 / 25: 🏎️} | Vulnerability researcher @stealien
ID: 1284947583262011392
19-07-2020 20:25:58
104 Tweet
868 Followers
358 Following

[#Zer0Con2025] 🎙️ SPEAKER Highlight: Manfred Paul "PAC2Own: From Bug to Shellcode in modern Safari" 🌐
![POC_Crew 👨👩👦👦 (@poc_crew) on Twitter photo [#Zer0Con2025]
🎙️ SPEAKER Highlight: <a href="/_manfp/">Manfred Paul</a>
"PAC2Own: From Bug to Shellcode in modern Safari" 🌐 [#Zer0Con2025]
🎙️ SPEAKER Highlight: <a href="/_manfp/">Manfred Paul</a>
"PAC2Own: From Bug to Shellcode in modern Safari" 🌐](https://pbs.twimg.com/media/GoI4OKFbQAAd7TH.jpg)

[#Zer0Con2025] 🎙️ SPEAKER Highlight: matteo malvica ⭕ "Breaking Chrome's V8: Type Confusion, WASM JIT-Spraying and Heap Sandbox Evasion" 💥
![POC_Crew 👨👩👦👦 (@poc_crew) on Twitter photo [#Zer0Con2025]
🎙️ SPEAKER Highlight: <a href="/matteomalvica/">matteo malvica ⭕</a>
"Breaking Chrome's V8: Type Confusion, WASM JIT-Spraying and Heap Sandbox Evasion" 💥 [#Zer0Con2025]
🎙️ SPEAKER Highlight: <a href="/matteomalvica/">matteo malvica ⭕</a>
"Breaking Chrome's V8: Type Confusion, WASM JIT-Spraying and Heap Sandbox Evasion" 💥](https://pbs.twimg.com/media/GoO_f6LbYAAxqCs.jpg)



Thanks to TyphoonCon🌪️ and sponsor’s support, I'm able to attend again this year 🥰 Looking forward to learning a lot and meeting amazing people at the conference!



🌪️ Kicking things off with our keynote by Andy Nguyen sharing how console hacking sparked his journey into cybersecurity.




🌪️ Tapping into the past TyphoonCon🌪️ with Rick de Jager & Carlo Meijer’s RCE via Fax Machine!


It seems like the Midnight Blue guys successfully demonstrated again their IVI exploit! Happy to meet Rick de Jager & Carlo at #TyphoonCon25


This year's TyphoonCon🌪️ was the best! I was grateful to make new friends and learn so much from them 🥰 If you’re looking to use Binary Ninja more efficiently, I'd highly recommend Kyle Martin's upcoming training! (2nd pic) In my experience, he’s one of the top who can help us

After 6 months of responsible disclosure, proud to announce our team discovered 13 (mostly exploitable) vulnerabilities in Samsung Exynos processors! Kudos to Billy, Ramdhan, [email protected] & rainbowpigeon CVE-2025-23095 to CVE-2025-23107 📍 semiconductor.samsung.com/support/qualit…



[ZDI-25-376|CVE-2025-23118] (Pwn2Own) Ubiquiti Networks AI Bullet Improper Certificate Validation Authentication Bypass Vulnerability (CVSS 7.5; Credit: Kiddo, @d0now, @insp3ct0r_x, Wonbeen Im, @leeju_04, JuYeong Lee, @nang__lam, slyfizz of STEALIEN Inc.) zerodayinitiative.com/advisories/ZDI…

[ZDI-25-377|CVE-2025-23119] (Pwn2Own) Ubiquiti Networks AI Bullet Improper Neutralization of Escape Sequences Authentication Bypass Vulnerability (CVSS 7.5; Credit: Kiddo, @d0now, @insp3ct0r_x, Wonbeen Im, @leeju_04, JuYeong Lee, @nang__lam, slyfizz) zerodayinitiative.com/advisories/ZDI…

