
j j
@mistymntncop
infosec.exchange/@blackeggs
github.com/mistymntncop/
ID: 820795831418699777
16-01-2017 00:52:30
1,1K Tweet
2,2K Followers
5,5K Following

`People talk about exploits as if they are "weapons", but really, they are fragile and stunningly improvisational rube goldberg machines.` ~Halvar Flake youtube.com/watch?v=bl2U1p…










(CVE-2025-2783)[405143032][mojo] Google Chrome Sandbox Escape(exploited ITW) is now open(PoC & exploit are restricted🥲) issues.chromium.org/issues/4051430… Reported by Boris Larin Igor Kuznetsov
![xvonfers (@xvonfers) on Twitter photo (CVE-2025-2783)[405143032][mojo] Google Chrome Sandbox Escape(exploited ITW) is now open(PoC & exploit are restricted🥲)
issues.chromium.org/issues/4051430…
Reported by <a href="/oct0xor/">Boris Larin</a> <a href="/2igosha/">Igor Kuznetsov</a> (CVE-2025-2783)[405143032][mojo] Google Chrome Sandbox Escape(exploited ITW) is now open(PoC & exploit are restricted🥲)
issues.chromium.org/issues/4051430…
Reported by <a href="/oct0xor/">Boris Larin</a> <a href="/2igosha/">Igor Kuznetsov</a>](https://pbs.twimg.com/media/GujEXV8XUAA5TeQ.jpg)





CVE-2025-4941 - Trend ZDI analyst Hossein Lotfi details the Firefox bug used at #Pwn2Own Berlin by Manfred Paul. Includes root cause analysis and video demo. zerodayinitiative.com/blog/2025/7/14…


Escalation methodology for CVE-2024-4947, a in-the-wild V8 type confusion bug. Shoutout to vaber, Boris Larin, 1377 High-yield Nukes, j j, 303f06e3 and Dimitri Fourny for their great research for this bug! github.com/bjrjk/CVE-2024…


.Ryan Fleury's talk is out! Come learn why and how RADDBG so smoothly goes far beyond text debugging. youtu.be/_9_bK_WjuYY