Perri Adams (@perribus) 's Twitter Profile
Perri Adams

@perribus

Computers, etc. • Personal Account

ID: 301817700

calendar_today20-05-2011 03:31:50

1,1K Tweet

6,6K Followers

979 Following

Hamed Mahdavi (@hamedmahdavi93) 's Twitter Profile Photo

🧵 1/ How well do LLMs actually do on Olympiad-level math? We evaluated frontier models on 455 problems from the IMO Shortlist. Unlike most benchmarks, we emphasize proof validity, not just final answer correctness. Here’s what we found 👇

🧵 1/ How well do LLMs actually do on Olympiad-level math?

We evaluated frontier models on 455 problems from the IMO Shortlist.

Unlike most benchmarks, we emphasize proof validity, not just final answer correctness.
Here’s what we found 👇
Vijay Bolina (@vijaybolina) 's Twitter Profile Photo

Very excited to announce Sec-Gemini v1, our experimental model specialized in cybersecurity, that will be made freely available to select organizations, institutions, professionals for research purposes. Read more from ⁦Elie Bursztein⁩ security.googleblog.com/2025/04/google…

Hossein Lotfi (@hosselot) 's Twitter Profile Photo

The fix for #Pwn2Own Mozilla Firefox Out-of-bounds access vulnerability when resolving Promise objects (CVE-2025-4920 [1966612]): hg-edge.mozilla.org/mozilla-centra…

Kylie McDevitt (@kylieengineer) 's Twitter Profile Photo

.offensivecon was a great conference — big thanks to the organisers for putting on such a solid event. Silvio Cesare , I, and the InfoSect team had a great time socialising, learning, and catching up with the community.

.<a href="/offensive_con/">offensivecon</a> was a great conference — big thanks to the organisers for putting on such a solid event. <a href="/silviocesare/">Silvio Cesare</a> , I, and the <a href="/infosectcbr/">InfoSect</a> team had a great time socialising, learning, and catching up with the community.
Winnona 💾 (@__winn) 's Twitter Profile Photo

"Tianfu Cup takes vulnerabilities and sends it straight to the Chinese intelligence apparatus" - youtu.be/8kpnSb4yGR0?si… Thanks to Bloomberg Originals and Jamie Tarabay for having me to talk about China's hacking ecosystem 🖤 this was so much fun!

"Tianfu Cup takes vulnerabilities and sends it straight to the Chinese intelligence apparatus" - youtu.be/8kpnSb4yGR0?si…

Thanks to <a href="/bbgoriginals/">Bloomberg Originals</a> and <a href="/jamietarabay/">Jamie Tarabay</a> for having me to talk about China's hacking ecosystem 🖤 this was so much fun!
Dino A. Dai Zovi (@dinodaizovi) 's Twitter Profile Photo

My keynote at offensivecon 2025, "How Offensive Security Made Me Better at Defense": Video: youtu.be/60BcjiChncE Slides: docs.google.com/presentation/d…

Winnona 💾 (@__winn) 's Twitter Profile Photo

Tired: cyber policy wonks saying "you don't technical skills to be in cyber" 🤡 Wired: Perri Adams exploiting a bug in SSH *previously thought un-exploitable* at OffensiveCon to talk about AI in exploit development. 😤 More RE / VR policymakers pls! 👏 Perri sets the bar. 💕

Sean Heelan (@seanhn) 's Twitter Profile Photo

I wrote-up how I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation. Link to the blog post below 👇

Nadav Lorber (@lnadav) 's Twitter Profile Photo

Joining the MCP trend with windbg-ext-mcp 🐛Now you can vibe debugging your Windows kernel: github.com/NadavLor/windb… Example of asking Claude to hide explorer.exe by unlinking it from EPROCESS + PspCidTable: #windbg #mcp

Joining the MCP trend with windbg-ext-mcp 🐛Now you can vibe debugging your Windows kernel:
github.com/NadavLor/windb…

Example of asking Claude to hide explorer.exe by unlinking it from EPROCESS + PspCidTable:
#windbg #mcp
Blackhoodie (@blackhoodie_re) 's Twitter Profile Photo

BlackHoodie is beyond thrilled to collaborate with Hex-Rays SA again at REcon REcon to attract, and retain, more women in the reverse engineering field! The honor is ours. The training will be hosted by the incomparable trainers Suweera DeSouza and bitmaize!

Jael Koh (@_jaelkoh) 's Twitter Profile Photo

The slides for offensivecon talk "Hunting for overlooked cookies in Windows 11 KTM and baking exploits for them" by Cedric Halbronn and I are here: docs.google.com/presentation/d…