D4mianWayne Profile Banner
Robin Profile
Robin

@D4mianWayne

Followers
519
Following
2K
Media
16
Statuses
250

Wannabe pwner! Founder @PwnFuzz | CTFs @shellphish

Batcave, Gotham
Joined May 2019
Don't wanna be here? Send us removal request.
@qriousec
Qrious Secure
1 month
Our fuzzer generated entirely by Vibing just found it first ( confirmed! ) 0day in Firefox. CVE and details soon!
10
86
711
@D4mianWayne
Robin
3 months
Teaming with @gh0stbyt3, we built DiffRays for headless IDA (@HexRaysSA) decompilation. It stores decompiled code in a SQLite DB and provides a Web UI for diffing between the stored functions. Built for vuln research. https://t.co/U6RzM3XcXk #pwnfuzz
5
39
132
@D4mianWayne
Robin
3 months
This is absolute good, as an individual researcher, one wouldn't normally think of setting up the a honeypot and monitor it, spent around 3 nights to came up with exploit only to be outsmarted, this is absolute great! Awesome work as usual!
@watchtowrcyber
watchTowr
3 months
"Teach a hacker to find vulnerabilities, and they might find a couple. Teach a hacker to steal warez from another idiot, and they will feast for eternity" Enjoy our analysis of CrushFTP's CVE-2025-54309, fueled by watchTowr's Attacker Eye https://t.co/G2lHM4ASpd
0
0
7
@codewhitesec
CODE WHITE GmbH
4 months
We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange
9
162
644
@D4mianWayne
Robin
4 months
RT @alisaesage: CVE-2025-22224
0
1
0
@chudyPB
Piotr Bazydło
5 months
My Sitecore CMS pre-auth RCE chain blog is public now. Enjoy 🫡
@watchtowrcyber
watchTowr
5 months
With the help of the Sesame Street gang, watchTowr Labs is back - with a pre-auth RCE chain against Sitecore Experience Platform that we discovered and reported in February this year. Enjoy..... https://t.co/1ii0LQPCPw
6
20
110
@gh0stbyt3
Nikhil
8 months
I made this tool that checks if drivers from https://t.co/QABNdVCnBU are blocked by HVCI. It helps identify vulnerable drivers not blocked by Windows Hypervisor Code Integrity policy to find suitable BYOVD candidates. Tool: https://t.co/57NDRuKiby #BYOVD #HVCI #Cybersecurity
0
8
16
@udunadan
dunadan
8 months
Never assume you've understood a bug report correctly unless you've written a PoC for it (or an exploit if one is present). You'll be surprised to catch your slightest misunderstanding of a verbal description of an issue and it'll make you question your ability to read.
3
6
54
@MrAle_98
MrAle98
9 months
Developed an exploit for CVE-2025-21333 (quite unreliable): vulnerability in vkrnlintvsp.sys. Exploit code: https://t.co/PU1ZYSefnJ Exploits a paged pool overflow overwriting a _IOP_MC_BUFFER_ENTRY*. Hope you find it useful in case not already shown🙂.
Tweet card summary image
github.com
POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY - MrAle98/CVE-2025-21333-POC
9
104
380
@gh0stbyt3
Nikhil
10 months
0x0 - Windows Driver 101 - https://t.co/QQBRbTnwQP 0x1 - Setup & Reversing - https://t.co/eeONmyJAUj 0x2 - SMEP & kASLR & VBS - https://t.co/gCeVED3kpO 0x3 - VBS & HVCI - https://t.co/434waY8CxS #windows #cybersecurity #kernel #redteam
0
2
6
@safebreach
SafeBreach
11 months
Starting 2025 strong! We’ve developed a PoC exploit for CVE-2024-49112. Read the blog and check out the GitHub repo: https://t.co/hd9qI2vm6o Just the beginning of the great things SafeBreach will deliver this year; stay informed at https://t.co/1wVKwuwM6Z. #CTEM #whatisPropagate
safebreach.com
SafeBreach provides the leading exposure validation platform, combining breach and attack simulation with attack path validation.
1
44
122
@thezdi
Trend Zero Day Initiative
11 months
In his latest blog, @chudyPB covers a pre-auth Arbitrary File Deletion vulnerability he discovered in the SolarWinds Access Rights Manager (ARM). It may not sound exciting, but it can lead to an LPE on domain-joined Windows machines. Read the details at
Tweet card summary image
zerodayinitiative.com
Some time ago, I spent some time researching a core SolarWinds product, SolarWinds Platform (previously Orion Platform). At that time, I hadn’t been aware of the SolarWinds Access Right Manager...
2
21
55
@D4mianWayne
Robin
1 year
New blog post on exploiting XXE in Ivanti Endpoint Manager (CVE-2024-37397)! No more hardcoded values—chained an API method to fetch the required ID. Full details here: https://t.co/jFzfWtVOlf #Infosec #XXE #CVE202437397 #BugBounty #AppSec
old.pwnfuzz.com
This blog provides an in-depth analysis of the exploitation process for an unauthenticated XXE vulnerability in Ivanti Endpoint Manager, identified as CVE-2024-37397. Uncovering the ImportXml...
@D4mianWayne
Robin
1 year
With all the buzz around Ivanti EPM CVEs, here’s my take on the unauthenticated XXE (CVE-2024-37397): https://t.co/AukrILqyLM. Vulnerability Credit: 06fe5fd2bc53027c4a3b7e395af0b850e7b8a044 (Trend Micro). Stay tuned for the blog post! #CVE #Ivanti #Security
2
29
123
@chudyPB
Piotr Bazydło
1 year
My WarCon slides about Ivanti Avalanche are public! I tried to do some mapping of the attack-surface, show the new auth mechanism and present some research ideas (things I didn't try). It also shows my first-ever fuzzing and memory corruption experience😆 https://t.co/FBeKGI16nJ
Tweet card summary image
github.com
ZDI presentations, publications, whitepapers etc. Contribute to thezdi/presentations development by creating an account on GitHub.
1
41
149
@Razeki_
Razeki
1 year
I was just laid off at Hi-Rez today. I'm thankful for all the time I spent, the people I worked with, and the games I worked on. If anyone is looking for a gameplay programmer... I'm you're guy.
10
47
350
@chudyPB
Piotr Bazydło
1 year
Blog about my @PwnieAwards nominated Exchange RCE gadget chain dropped: 1) File Write to drop DLL to unknown directory and leak this path to log file. 2) File Read to leak write location from the log file. 3) Local DLL loading gadget -> RCE It was a fun process 🥲
@thezdi
Trend Zero Day Initiative
1 year
In part 3 of his series on exploiting #Exchange #Powershell after ProxyNotShell, ZDI researcher @chudyPB chains 3 bugs that lead to RCE, mainly by abusing the single-argument constructor conversions. Read the details at
2
42
169
@D4mianWayne
Robin
1 year
With all the buzz around Ivanti EPM CVEs, here’s my take on the unauthenticated XXE (CVE-2024-37397): https://t.co/AukrILqyLM. Vulnerability Credit: 06fe5fd2bc53027c4a3b7e395af0b850e7b8a044 (Trend Micro). Stay tuned for the blog post! #CVE #Ivanti #Security
0
2
15
@D4mianWayne
Robin
1 year
I examined the mySCADA myPRO Hard-Coded Credentials RCE Vulnerability - CVE-2024-4708. The hardcoded password is "brumla". Kudos to Nassim Asrir (Trend Micro) for discovering this. Not sure about the RCE exploit vector yet.
0
0
6