Mikhail Shcherbakov (@yu5k3) 's Twitter Profile
Mikhail Shcherbakov

@yu5k3

Doing security research. For whom?..

ID: 2829272861

calendar_today14-10-2014 10:25:03

450 Tweet

927 Followers

620 Following

Sean Heelan (@seanhn) 's Twitter Profile Photo

I wrote-up how I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation. Link to the blog post below 👇

Mikhail Shcherbakov (@yu5k3) 's Twitter Profile Photo

Reply if you want the list of resources that I used to dev my own Chrome RCE exploit. Might write a thread if there's interest. Also, if you have an SSRF in Chrome 134 in a BBP, DM me. It could be a great collab to turn the report into a full RCE 🤝

Jorian (@j0r1an) 's Twitter Profile Photo

Small tip for the JavaScript reverse engineers out there, Chrome has a `debug()` function which triggers a breakpoint whenever its first argument is called. It even works on built-in methods, no more wrapping stuff in proxies :D debug(DOMParser.prototype.parseFromString)

Small tip for the JavaScript reverse engineers out there, Chrome has a `debug()` function which triggers a breakpoint whenever its first argument is called. It even works on built-in methods, no more wrapping stuff in proxies :D

debug(DOMParser.prototype.parseFromString)