pwnthem0le (@pwnthem0le) 's Twitter Profile
pwnthem0le

@pwnthem0le

Academic CTF Team - Politecnico di Torino | m0leCon Security Conference & CTF organizers | @aboutblankets

ID: 1146866854192963589

linkhttp://pwnthem0le.polito.it calendar_today04-07-2019 19:42:20

333 Tweet

1,1K Followers

35 Following

pwnthem0le (@pwnthem0le) 's Twitter Profile Photo

m0leCon 2025 Conference is almost here! 🔥 Registrations will officially open on Monday 17th at 12:00 🗓️ You can get a ticket at eventbrite.it/e/1056856990709 Don’t miss your chance to reserve a seat! See you soon! 👾

m0leCon 2025 Conference is almost here! 🔥
Registrations will officially open on Monday 17th at 12:00 🗓️

You can get a ticket at eventbrite.it/e/1056856990709
Don’t miss your chance to reserve a seat!

See you soon! 👾
pwnthem0le (@pwnthem0le) 's Twitter Profile Photo

We are pleased to announce the first  for the sixth edition of the m0leCon conference! Satoki@Kn0wl3dg3 will bring his work, "Stealth Exposures: Advanced Side-Channel Attacks Targeting Mozilla Firefox's Protocol Handlers"! More info at m0lecon.it

We are pleased to announce the first  for the sixth edition of the m0leCon conference! <a href="/satoki00/">Satoki@Kn0wl3dg3</a> will bring his work, "Stealth Exposures: Advanced Side-Channel Attacks Targeting Mozilla Firefox's Protocol Handlers"!

More info at m0lecon.it
pwnthem0le (@pwnthem0le) 's Twitter Profile Photo

Robin Jadoul is ready to question your math beliefs with his talk "How to prove that 42 is prime"! 🔥 More info at m0lecon.it

Robin Jadoul is ready to question your math beliefs with his talk "How to prove that 42 is prime"! 🔥

More info at m0lecon.it
pwnthem0le (@pwnthem0le) 's Twitter Profile Photo

Let's move to the physical world with the talk "Exploiting Smart TVs using the HbbTV Protocol" by Andrej Danis! 🖥 More info at m0lecon.it

Let's move to the physical world with the talk "Exploiting Smart TVs using the HbbTV Protocol" by Andrej Danis! 🖥

More info at m0lecon.it
pwnthem0le (@pwnthem0le) 's Twitter Profile Photo

🕷️ Join 自称会社員 as he gives new life to old PHP vulnerabilities with fresh techniques in his talk "Unawakened Wakeup: A New PHP Object Injection Technique for __wakeup() Bypass"! More info at m0lecon.it

🕷️ Join <a href="/hhc0null/">自称会社員</a> as he gives new life to old PHP vulnerabilities with fresh techniques in his talk "Unawakened Wakeup: A New PHP Object Injection Technique for __wakeup() Bypass"!

More info at m0lecon.it
pwnthem0le (@pwnthem0le) 's Twitter Profile Photo

Join Emanuele Barbeno and Yves Bieri as they dive into the vulnerability analysis, RCE exploitation, and the unique challenges of Pwn2Own with their talk "Now I See You: Pwning the Synology BC500 Camera". More info at m0lecon.it

Join Emanuele Barbeno and <a href="/yves_bieri/">Yves Bieri</a> as they dive into the vulnerability analysis, RCE exploitation, and the unique challenges of Pwn2Own with their talk "Now I See You: Pwning the Synology BC500 Camera".

More info at m0lecon.it
pwnthem0le (@pwnthem0le) 's Twitter Profile Photo

And with "Voltage Glitching Intel Microcode", by Federico Cerutti, we've completed our conference program lineup 🔥Stay tuned for the detailed schedule! More info at m0lecon.it

And with "Voltage Glitching Intel Microcode", by Federico Cerutti, we've completed our conference program lineup 🔥Stay tuned for the detailed schedule!

More info at m0lecon.it
pwnthem0le (@pwnthem0le) 's Twitter Profile Photo

Less than two weeks until m0leCon 2025 Conference 🔥 Here the final talk schedule, see you all in Turin next week! More info at m0lecon.it

Less than two weeks until m0leCon 2025 Conference 🔥 Here the final talk schedule, see you all in Turin next week!

More info at m0lecon.it
pwnthem0le (@pwnthem0le) 's Twitter Profile Photo

Big thanks to all our sponsors for making m0leCon 2025 possible! We couldn't have done it without you! More info at m0lecon.it

Big thanks to all our sponsors for making m0leCon 2025 possible! We couldn't have done it without you!

More info at m0lecon.it
pwnthem0le (@pwnthem0le) 's Twitter Profile Photo

Excited for the opening talk at #m0leCon2025! Federico Cerutti dives into "Voltage Glitching Intel Microcode" 👾 A deep dive into hardware vulnerabilities and cutting-edge security research!

Excited for the opening talk at #m0leCon2025! Federico Cerutti dives into "Voltage Glitching Intel Microcode" 👾 A deep dive into hardware vulnerabilities and cutting-edge security research!
pwnthem0le (@pwnthem0le) 's Twitter Profile Photo

Now it's the turn of "Unawakened Wakeup: A New PHP Object Injection Technique for __wakeup() Bypass" by Hiroki Matsukuma, giving new life to PHP vulnerabilities!

Now it's the turn of "Unawakened Wakeup: A New PHP Object Injection Technique for __wakeup() Bypass" by Hiroki Matsukuma, giving new life to PHP vulnerabilities!
pwnthem0le (@pwnthem0le) 's Twitter Profile Photo

Even if from home, Andrej Danis managed to give a great insight on Smart TVs security with "Exploiting Smart TVs using the HbbTV Protocol" 📺

Even if from home, Andrej Danis managed to give a great insight on Smart TVs security with "Exploiting Smart TVs using the HbbTV Protocol" 📺
pwnthem0le (@pwnthem0le) 's Twitter Profile Photo

Last but not least, "Stealth Exposures: Advanced Side-Channel Attacks Targeting Mozilla Firefox's Protocol Handlers" by Satoki Tsuji concludes this edition of m0leCon. Thanks to everyone that made this possible once again! ♥️

Last but not least, "Stealth Exposures: Advanced Side-Channel Attacks Targeting Mozilla Firefox's Protocol Handlers" by Satoki Tsuji concludes this edition of m0leCon. Thanks to everyone that made this possible once again! ♥️