Eduardo Vela (@sirdarckcat) 's Twitter Profile
Eduardo Vela

@sirdarckcat

not mad. mentally divergent.

personal profile, opinions my own. everything I say is probably wrong.

๐Ÿ˜ @[email protected]

ID: 11855992

linkhttps://bsky.app/profile/sirdarckcat.bsky.social calendar_today04-01-2008 22:08:56

7,7K Tweet

12,12K Followers

594 Following

V4bel (@v4bel) 's Twitter Profile Photo

Google kernelCTF LTS/COS 0-day WIN! Successfully exploited an extremely complex race condition 0-day vuln on two instances without using namespaces ๐ŸŽ‰ work with qwerty

Google kernelCTF LTS/COS 0-day WIN!

Successfully exploited an extremely complex race condition 0-day vuln on two instances without using namespaces ๐ŸŽ‰

work with <a href="/_qwerty_po/">qwerty</a>
Kav (@kavehrazavi) 's Twitter Profile Photo

In less significant news, we have an open PhD position in COMSEC at ETH. We like low-level hw/sw with a security twist (think CPU/DRAM/RTL/browser/kernel). If you enjoy collaboration and want to see how deep the rabbit hole goes, send us your application! jobs.ethz.ch/job/view/JOPG_โ€ฆ

Rodrigo Branco (@bsdaemon) 's Twitter Profile Photo

Despedida da H2HC! (My goodbye to H2HC!) (English Version Just After the Portuguese) TLDR: Para aqueles que nรฃo conseguem ler uma carta longa, estou saindo da organizaรงรฃo da H2HC a partir do ano que vem (este ano ainda estarei ร  frente do evento, como sempre). Todas as

Eduardo Vela (@sirdarckcat) 's Twitter Profile Photo

Back in H2HC last week, Jordy Zomer and me presented this tool we've been working on (with Artem) we now call "๐Ÿง Kernel Explorer". It's still early on, I'll work on FF and a11y next! storage.googleapis.com/kernelctf-dashโ€ฆ storage.googleapis.com/kernelctf-dashโ€ฆ Code is github.com/google/securitโ€ฆ

Tim Willis (@itswillis) 's Twitter Profile Photo

It doesn't happen very often, but Project Zero is hiring! goo.gle/41DBQBY Please share with anyone you think would be awesome for the role ๐ŸŽ‰ Looking for at least one person. DMs open if you want to reach out about the role. The team: youtu.be/My_13FXODdU

h0mbre (@h0mbre_) 's Twitter Profile Photo

I tried my hand at exploiting an nday on the Google Container Optimized OS instance in kCTF but sadly was very late to the party. Here is my exploit write-up for it. I learned a lot during the process, let me know what you think. I'll post TL;DR in thread h0mbre.github.io/Patch_Gapping_โ€ฆ

Tavis Ormandy (@taviso) 's Twitter Profile Photo

You can now jailbreak your AMD CPU! ๐Ÿ”ฅWe've just released a full microcode toolchain, with source code and tutorials. bughunters.google.com/blog/542484235โ€ฆ

Royal Hansen (@royalhansen) 's Twitter Profile Photo

Just released:ย Google awarded nearly $12M to researchers around the world via our Vulnerability Reward Program: security.googleblog.com/2025/03/vulnerโ€ฆ

Royal Hansen (@royalhansen) 's Twitter Profile Photo

.Google is sharing details on EntrySign, an AMD Zen microcode signature validation vuln the security team recently discovered: bughunters.google.com/blog/542484235โ€ฆ

the_storm (@the_st0rm) 's Twitter Profile Photo

"Decoding Signal: Understanding the Real Privacy Guarantees of E2EE" I am thrilled to announce that my talk at Black Hat has been accepted. Looking forward to sharing some of my research with everyone ๐Ÿ’™๐Ÿ” #BHUSA

"Decoding Signal: Understanding the Real Privacy Guarantees of E2EE"
I am thrilled to announce that my talk at <a href="/BlackHatEvents/">Black Hat</a> has been accepted. Looking forward to sharing some of my research with everyone ๐Ÿ’™๐Ÿ” #BHUSA