0xor0ne
@0xor0ne
Followers
84K
Following
2K
Media
3K
Statuses
3K
| CyberSecurity | Reverse Engineering | C and Rust | Exploit | Linux kernel | PhD | My Tweets, My Opinions :) |
Europe
Joined August 2020
Cybersecurity related awesome list: blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation https://t.co/6YgCLKcdUH
#cybersecurity #infosec
9
57
302
Firmware encryption bypass on ESP32 through side channel attack (2024) https://t.co/PM5Xrxfsgv
#infosec #espressif
5
22
204
KernelSnitch: Side-Channel Attacks on Kernel Data Structures (paper) https://t.co/hVWMgXW8G7
#Linux #cybersecurity
0
26
128
Learning how to exploit DirtyPipe vulnerability in Linux kernel (@0xnull007 and @stdnoerr) https://t.co/0gQj0RkrY3
https://t.co/MdDPrfmweU
#infosec #Linux
1
34
173
Windows ARM64 Pointer Authentication (PAC) internals https://t.co/vGEt0XV4kL Credits @preludeorg
#infosec
0
31
195
Great deep-dive on AMD Zen microcode hacking and a signature-validation flaw https://t.co/wRsMgBup50
#infosec
0
36
207
Technical breakdown of how Espressif’s flash encryption can be bypassed through key derivation and boot process flaws https://t.co/PM5Xrxfsgv
#infosec #espressif
2
42
338
1
42
218
Exploiting LPE vulnerabilities in NVIDIA Linux Open GPU Kernel Modules by Robin Bastide (@quarkslab) https://t.co/IARbGJf0rQ
#infosec
1
24
130
Collection of blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation https://t.co/6YgCLKcdUH
#cybersecurity #infosec
1
73
463
Presentations about getting started with Linux kernel exploitation "Linux Kernel Exploitation for Beginners" by Kevin Massey: https://t.co/HNuwKGLTv1 "Control Flow Hijacking in the Linux Kernel" by Valeriy Yashnikov https://t.co/9HqgXvCpX4
#Linux #infosec
1
64
294
Crypto hardware wallet teardown with discovery and analysis of a bootloader stack overflow and an iris-auth logical flaw https://t.co/tWk9pwiomU Credits @hhj4ck
#infosec
0
12
74
Teardown and exploitation of the Nokia Beacon 1 Router by @spaceraccoonsec
https://t.co/PqCBTIUtfn
#iot #infosec
spaceraccoon.dev
The Nokia Beacon 1 proved to be an interesting journey covering the full spectrum of techniques from hardware debug interfaces to firmware extraction and finally both static and dynamic analysis. I...
1
13
63
How to root the TP-Link Tapo C200 Rev.5 by getting a UART shell, dumping the flash, and decrypting the rootfs https://t.co/bZs0gVGO5L Credits @qkaiser
#infosec #embedded
1
63
369
libANGLE out-of-bounds read to leak data from Chrome’s WebGPU process. https://t.co/iMg0juioE2 Credits @qriousec
#infosec #chrome
1
13
82
One-click memory corruption in Alibaba’s UC Browser (unpatched V8 bugs) https://t.co/qg9AW1Xan4 Credits @InterruptLabs
#infosec
0
14
123
Exploiting the M300 Wi-Fi Repeater (MT02) Part 1: https://t.co/5QZDMUpouj Part 2: https://t.co/VTPgMpg1Kg Blog post by @Chocapikk_
#embedded #cybersecurity
2
13
88
1
42
217
Synology TC500 smart camera: Remote code execution (RCE) vulnerability https://t.co/amxrG6E2uO
#infosec #embedded
2
16
99
Vulnerability discovery in the Rust-based Windows Graphics Device Interface (GDI) kernel component https://t.co/IE07yqV4yO Credits @CheckPointSW
#infosec
14
39
210
Excellent blog post on bypassing Ubuntu’s Unprivileged Namespace Restriction by @u1f383
https://t.co/Z0C6ly5tJ7
#infosec
6
37
174