n30m1nd (@n30m1nd) 's Twitter Profile
n30m1nd

@n30m1nd

😬

ID: 141420389

linkhttp://animal0day.blogspot.co.uk calendar_today08-05-2010 01:58:33

1,1K Tweet

1,1K Followers

715 Following

typeconfuser (@typeconfuser) 's Twitter Profile Photo

> we are having the CTF, and while checking traffic, I noticed that one of the team's exploits is not GLES 3.1 or compute shader specific. I checked that it's a 0day. > I eventually reported the issue to ensure that it actually is taken care of,

> we are having the CTF, and while checking traffic, I noticed that one of the team's exploits is not GLES 3.1 or compute shader specific. I checked that it's a 0day.
> I eventually reported the issue to ensure that it actually is taken care of,
Shirobon (@shirobon) 's Twitter Profile Photo

There are about 5 tickets left for tonight so if you haven't got yours yet do so now as they won't be available on the door! ra.co/events/1715458

n30m1nd (@n30m1nd) 's Twitter Profile Photo

Hey Andy Rozenberg Patrick Wardle seems we're missing each other and seems like you're not getting our emails (Cc Vignesh Rao ). Check your DMs for confirmation! We're excited to be on this edition of #OBTS!

n30m1nd (@n30m1nd) 's Twitter Profile Photo

Night full of bangers by Shirobon Too bad couldn't hear Xilioh live but "there's only so much you can fit in a set"; maybe next time 😁. Shouts to cTrix for keeping the hard-core vibe after ❯ julie going 🤘

Samuel Groß (@5aelo) 's Twitter Profile Photo

Sharing another V8 Sandbox design document more widely: docs.google.com/document/d/1CP… This one discusses how to protect code pointers - probably the most performance sensitive part touched by the sandbox - with (almost) no performance overhead.

Qyn (@qynln) 's Twitter Profile Photo

Here is the writeup for CVE-2023-3389, a Use-After-Free on an hrtimer in io_uring, which I exploited for the kCTF VRP qyn.app/posts/CVE-2023…

Exodus Intelligence (@xi_research) 's Twitter Profile Photo

Join us in London, England on Nov 14, 2023, for our highly anticipated Browser and Mobile Exploitation trainings! #exploitation #Training #Cybersecurity #London blog.exodusintel.com/2023/08/04/pub… blog.exodusintel.com/2023/08/04/pub…

Doc Dave (@forensicdave) 's Twitter Profile Photo

At #OBTS Javier (n30m1nd) and Vignesh (Vignesh Rao) from Exodus Intelligence fuzz'd and audited the cr.p out of the Webkit JavaScript engine JavaScriptCore - bugs bugs and moar bugs were found!

At #OBTS Javier (<a href="/n30m1nd/">n30m1nd</a>) and Vignesh (<a href="/sherl0ck__/">Vignesh Rao</a>) from <a href="/ExodusIntel/">Exodus Intelligence</a> fuzz'd and audited the cr.p out of the Webkit JavaScript engine JavaScriptCore - bugs bugs and moar bugs were found!
Yordan Stoychev (@yordanstoychev) 's Twitter Profile Photo

Finished a write-up of a vulnerability in the io_uring subsystem of the Linux Kernel. This one is interesting because it gives you an incredibly powerful primitive - a multipage-wide OOB read and write to physical memory. anatomic.rip/cve-2023-2598/

n30m1nd (@n30m1nd) 's Twitter Profile Photo

A V8 writeup of a recently patched vulnerability we found a few months back, affecting Maglev, and probably one of the last exploits to be "unaffected" by Ubercage on x86 :)

Hexacon (@hexacon_fr) 's Twitter Profile Photo

👑 As long as Javascript JIT is present, browsers will always be the supreme way to remotely pwn a device. Delve into the quirky world of JS engine vulnerabilities and exploits with n30m1nd ➡️ hexacon.fr/trainer/jimene… 📆 30/09-03/10 2024 📍Espace Vinci, Rue des Jeuneurs, Paris

👑 As long as Javascript JIT is present, browsers will always be the supreme way to remotely pwn a device.

Delve into the quirky world of JS engine vulnerabilities and exploits with <a href="/n30m1nd/">n30m1nd</a>

➡️ hexacon.fr/trainer/jimene…
📆 30/09-03/10 2024
📍Espace Vinci, Rue des Jeuneurs, Paris
Martijn Bogaard (@jmartijnb) 's Twitter Profile Photo

offensivecon was an absolute blast! It was amazing catching up, making new friends, and timeless memories. And thanks to Cellebrite my phone didn't run out of juice😅. Xray by a friend.

<a href="/offensive_con/">offensivecon</a> was an absolute blast! It was amazing catching up, making new friends, and timeless memories. And thanks to <a href="/Cellebrite/">Cellebrite</a> my phone didn't run out of juice😅. Xray by a friend.
Lorenz Lehmann (@lehmannlorenz) 's Twitter Profile Photo

Today, my PC was nearly compromised. With just one click, I installed a malicious Visual Studio Code extension. Luckily, I was saved as my PC doesn't run on Windows. Hackers are getting smarter and aren't just targeting beginners. Here's how they do it and how you can protect your coins!

Today, my PC was nearly compromised.

With just one click, I installed a malicious <a href="/code/">Visual Studio Code</a> extension. Luckily, I was saved as my PC doesn't run on Windows.

Hackers are getting smarter and aren't just targeting beginners. Here's how they do it and how you can protect your coins!