0xdea Profile Banner
raptor@infosec.exchange Profile
Followers
14K
Following
283
Media
1K
Statuses
13K

When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl.

Europe
Joined July 2010
Don't wanna be here? Send us removal request.
It finally happened… I’ve been published on #Phrack! After more than five years since the last issue, #Phrack70 is out, featuring my article “Exploiting a Format String Bug in Solaris CDE”! I guess I can retire now 🐛.
6
62
324
RT @joernchen: Today I have a more serious topic than usual, please consider reposting for reach:. My wife and I are urgently looking for a….
0
110
0
@grok
Grok
6 days
What do you want to know?.
479
310
2K
RT @orange_8361: Turns out my #PHRACK article is live! 🔥. > The Art of PHP — My CTF Journey and Untold Stories!. Kinda a love letter to tho….
0
195
0
RT @orange_8361: Thanks @PortSwigger and @BugBountyDEFCON for this awesome event — and also to my @d3vc0r3 buddies for standing on stage to….
0
32
0
Always happy news to see my work spark new joy. In this case, my @semgrep ruleset at Congrats to @trailofbits and best wishes for a wonderful career to Will 👍.
Tweet card summary image
github.com
A collection of my Semgrep rules to facilitate vulnerability research. - 0xdea/semgrep-rules
@trailofbits
Trail of Bits
20 days
Today, we’re disclosing two 9.8 CVSS memory corruption vulnerabilities in the @NVIDIA Triton Inference Server that lets attackers crash production AI services through malicious HTTP requests (CVE-2025-23310 and CVE-2025-23311) 🧵.
0
11
46
RT @hnsec: In our last post, @apps3c shares some PoCs of GenAI/LLM security issues found in real-world assessments conducted for corporate….
Tweet card summary image
security.humanativaspa.it
Generative AI and LLM technologies have shown […]
0
3
0
Today I’m celebrating one year of #Rust! 🦀 . I started learning it last summer, and since then, I’ve pretty much stopped programming in any other language. I’ve documented my journey in this series of articles: . Here’s to many more years with Rust! 🥂
Tweet media one
2
5
50
RT @xorpse: I'm pleased to announce a new version of the Rust bindings for @HexRaysSA IDA Pro! With:. - Improved strings, metadata, and cor….
0
33
0
As an old fart in #xdev, I often get asked how to get into binary exploitation in 2025. I looked around, and here’s my recommendation:. . #pwncollege is a huge collection of free #lectures and practical #challenges maintained by a team of #hackers at @ASU.
Tweet media one
1
23
102
RT @hnsec: In our last blog post, our colleague Gianluca shares the story of a lucky discovery: a bug initially spotted during a routine as….
Tweet card summary image
security.humanativaspa.it
Some months ago, while analyzing a […]
0
8
0
Tweet media one
0
33
0
RT @HexRaysSA: Power users are taking IDA headless with idalib. Think large-scale diffing, custom UIs, and CI pipelines. all without laun….
Tweet card summary image
hex-rays.com
Discover four powerful ways to use idalib, IDA Pro’s headless automation interface, for scalable reverse engineering, CI integration, and more.
0
14
0
RT @pulsoid: Happy to see our research replicated and dug even further!. We did it with EMFI, @hnsec did it with Voltage glitching. But the….
0
5
0
RT @hnsec: Exploring fault injection on ESP32 V3! . Inspired by Delvaux work, we tested voltage #glitching as an attack vector. With advanc….
security.humanativaspa.it
Intro A few months ago, I […]
0
6
0
RT @Openwall: End of an era: our CVSweb service turned 21 today, and was promptly retired. Our anoncvs was similarly shut down at the age o….
0
3
0
RT @2ourc3: Just launched Code Auditor CTF — A web platform to practice finding real-world C/C++ vulnerabilities.•….
Tweet card summary image
github.com
The most complete code auditing platform with thousands of real-world challenges - 20urc3/auditor.codes
0
146
0
RT @disconnect3d_pl: We released new Pwndbg: !. It brings new kernel commands for dumping heap allocator info, disp….
0
68
0