78ResearchLab Profile
78ResearchLab

@78_lab

Followers
397
Following
66
Media
0
Statuses
22

Cyber Security Research Company - https://t.co/tYFh6ZCNLaโ€ฆ

Seoul, S.Korea
Joined June 2022
Don't wanna be here? Send us removal request.
@nanosec_asia
NanoSec Asia
18 days
๐Ÿšจ New talk #ParallelPulse2025: @78_lab breaks down Gunra, a Conti-variant that hit major SK banks. Learn how @78_lab reverse-engineered the malware, found a critical vuln & replicated decryption via a known-plaintext attack. ๐Ÿ‘‰ https://t.co/ZXy0cHrO9Q
0
3
8
@nanosec_asia
NanoSec Asia
11 days
#ParallelPulse @nanosec_asia 2025 kicks off with our Technical Training series! Welcome back to KL @krNeoTra & Sangsoo Jeong of @78_lab ! The stage is set. ๐Ÿฆธโ€โ™‚๏ธ ๐–ถ๐–พโ€™๐—‹๐–พ ๐—‹๐–พ๐–บ๐–ฝ๐—’! ๐—๐—๐–พ ๐—‹๐–พ๐–บ๐—… ๐—Š๐—Ž๐–พ๐—Œ๐—๐—‚๐—ˆ๐—‡ ๐—‚๐—Œ: ๐– ๐–ฑ๐–ค U?! ๐Ÿ”œ https://t.co/jBLXTqIf1m
0
5
7
@nanosec_asia
NanoSec Asia
10 days
โœจ Welcome & TQ #ParallelPulse @ https://t.co/6eUs41gBYy 2025 trainers - Nasi Kandar Style! @krNeoTra Sangsoo Jeong @78_lab , Harry Koh, Rozaili Idris, Kaz Goto @MagnetForensics, Luqman, @dinobitoo & @ammar_aryani Eclogic. Let the learning, hacking, hunting & building begin!
0
2
9
@nanosec_asia
NanoSec Asia
7 days
#ParallelPulse wrapped up ๐€๐๐ฏ๐š๐ง๐œ๐ž๐ ๐“๐ก๐ซ๐ž๐š๐ญ ๐‡๐ฎ๐ง๐ญ๐ข๐ง๐  & ๐ˆ๐‘ training with an amazing cohort! Huge ๐Ÿซถ to everyone who dug into the labs & pushed through the challenges. ๐Ÿ™to @krNeoTra & Sangsoo @78_lab for your amazing sharing. Onward we go, stronger & sharper!
0
2
10
@nanosec_asia
NanoSec Asia
5 days
๐Ÿ’ฅ What. A. Finish. Sangsoo Jeong from @78_lab wrapped Day 1 with explosive insights in Down to 256 flipping ransomware errors into defender advantage like a pro. Energy = MAXED OUT. #ParallelPulse 2025
0
3
6
@78_lab
78ResearchLab
4 days
Windows Remote Desktop Licensing Service Pre-auth RCE (CVE-2024-38077) Analysis https://t.co/bObMB5TIUR
Tweet card summary image
blog.78researchlab.com
1. ๊ฐœ์š”
0
8
21
@Tinolle
Milos Constantin โ™(@Tinolle hachyderm.io )
4 months
Fuzzing: From Zero to 0-day #1 | Introduction to Fuzzing https://t.co/YMSc7VtUcV
Tweet card summary image
blog.78researchlab.com
1. ๊ฐœ์š”
0
4
4
@5mukx
Smukx.E
4 months
From Zero to 0-day. Introduction to Fuzzing https://t.co/pfIfPTYtPS
1
99
536
@78_lab
78ResearchLab
10 months
LoopFi Code4rena Contest Review - Part 1 https://t.co/yAoUMCw82O
Tweet card summary image
blog.78researchlab.com
Overview
0
2
2
@78_lab
78ResearchLab
3 years
The analysis report is uploaded! https://t.co/sozQIt5By0
Tweet card summary image
blog.78researchlab.com
Introduction
@78_lab
78ResearchLab
3 years
Our researchers wrote a PoC code for Windows IKE Patch today! The analysis report will be posted soon! https://t.co/Uk6YPp00BI
0
19
42
@guhe120
Yuki Chen
3 years
Nice PoC for one of my IKE bugs fixed this month๐Ÿ˜€
@78_lab
78ResearchLab
3 years
Our researchers wrote a PoC code for Windows IKE Patch today! The analysis report will be posted soon! https://t.co/Uk6YPp00BI
0
8
49
@0patch
0patch
3 years
Micropatch Available For Memory Corruption in Microsoft Outlook (CVE-2022-35742) https://t.co/DGFs7McKu3
1
7
10
@0patch
0patch
3 years
We'd like to thank @hpy_insu of @78_lab for publishing their analysis and providing a proof-of-concept that allowed us to reproduce the vulnerability and create a micropatch. We also encourage security researchers to privately share their analyses with us for micropatching.
0
3
4
@hpy_insu
insu
3 years
I found this bug recently and unfortunately it was patched.
@78_lab
78ResearchLab
3 years
Our researchers wrote a PoC code for Windows IKE Patch today! The analysis report will be posted soon! https://t.co/Uk6YPp00BI
0
3
15
@78_lab
78ResearchLab
3 years
Our researchers wrote a PoC code for Windows IKE Patch today! The analysis report will be posted soon! https://t.co/Uk6YPp00BI
1
42
140
@0patch
0patch
3 years
We'd like to thank Polar Bear for finding this issue, and @78_lab researchers for publishing their analysis and providing a proof-of-concept that allowed us to reproduce the vulnerability and create a micropatch.
@78_lab
78ResearchLab
3 years
Our researchers wrote another PoC code and analysis about Windows IKE Extension(CVE-2022-21849)! https://t.co/gY9jYWGLjy
0
6
6
@78_lab
78ResearchLab
3 years
Our researchers wrote another PoC code and analysis about Windows IKE Extension(CVE-2022-21849)! https://t.co/gY9jYWGLjy
Tweet card summary image
blog.78researchlab.com
Introduction
0
49
123