
James Forshaw
@tiraniddo
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Tweets are my own etc. Mastodon: @[email protected]
ID: 58304160
https://www.tiraniddo.dev 19-07-2009 21:51:28
6,6K Tweet
49,49K Followers
343 Following




We finished our presentation at #BHUSA and the slides were published here: i.blackhat.com/BH-US-24/Preseโฆ, you can also find the latest slides and demo here: github.com/ga1ois/BlackHaโฆ, enjoy, especially for our new "field confusion" V8 sbx escape technique : ) Edouard Bochin Black Hat


Just to remind people I'll be signing copies of my book at 12:30 at Defcon today at the No Starch Press vendor area. See nostarch.com/defcon for details.




Put up the slides for my Microsoft BlueHat 2024 presentation on improvements to OleView.NET github.com/tyranid/infoseโฆ You can also grab v1.15 of OleView.NET from the PS Gallery which has the new features to generate proxy clients on the fly.


Project Zero Blogpost recap for the month: googleprojectzero.blogspot.com/2024/10/the-wiโฆ โ j00ru//vx doing another deep dive into the Windows Registry googleprojectzero.blogspot.com/2024/10/effectโฆ โ Nick Galloway's dav1d fuzzing case study (new) googleprojectzero.blogspot.com/2024/10/from-nโฆ โ an update on using LLMs to find vulns Enjoy! ๐


Finding 0day is not the most impactful thing that Project Zero does ๐ฒ โ it's sharing knowledge ๐ง . One part of that sharing is our tooling work to help other devs and reserachers. Today's installment, James Forshaw's updated OleView.NET๐ Blog: googleprojectzero.blogspot.com/2024/12/windowโฆ

My blog post is now live alongside Amnesty International 's joint release, providing remarkable insight into an ITW exploitation campaign! googleprojectzero.blogspot.com/2024/12/qualcoโฆ Turns out that you can find out quite a bit with just some kernel stacktraces ;) From Amnesty: securitylab.amnesty.org/latest/2024/12โฆ

If you've ever wondered if one can determine a vuln from just the kernel panic logs, Seth Jenkins (feat. Jann Horn - [email protected] & Benoรฎt) have something to share: googleprojectzero.blogspot.com/2024/12/qualcoโฆ Great to collaborate with Amnesty International, find vulns and get them fixed: securitylab.amnesty.org/latest/2024/12โฆ

Two new posts from James Forshaw today: googleprojectzero.blogspot.com/2025/01/windowโฆ on reviving a memory trapping primitive from his 2021 post. googleprojectzero.blogspot.com/2025/01/windowโฆ where he shares a bug class and demonstrates how you can get a COM object trapped in a more privileged process. Happy Reading! ๐

James Forshaw and his ๐ผ panda kicks-off Day 2 Off-By-One Conference 2025 with ๐๐ ๐ฒ๐จ๐ฎ ๐๐จ๐ง'๐ญ ๐๐๐ซ๐ ๐๐๐จ๐ฎ๐ญ ๐ ๐ฏ๐ฎ๐ฅ๐ง๐๐ซ๐๐๐ข๐ฅ๐ข๐ญ๐ฒ, ๐ฐ๐ก๐ฒ ๐ฌ๐ก๐จ๐ฎ๐ฅ๐ ๐? Full house yo!


More goodies!! James Forshaw , Keynote Speaker at Off-By-One Conference books are available at No Starch Press . Use our conference discount code ๐๐ ๐ ๐๐๐๐ to enjoy a 30% on James books! nostarch.com/networkprotocoโฆ nostarch.com/windows-securiโฆ
