
Dimitri Fourny
@DimitriFourny
Followers
2K
Following
939
Media
5
Statuses
2K
RT @Synacktiv: 🚗🔌 We reverse engineered the Tesla Wall Connector and uncovered a previously undocumented attack surface via the charging ca….
0
47
0
RT @TrenchantARC: Remember that great OffensiveCon talk? Or sad you missed it? Well, here are the slides for it!
0
42
0
RT @Synacktiv: The "Objective-C helper" IDA plugin presented during the @sth4ck talk "Demystifying Objective-C internals" given by @v1csec….
0
21
0
RT @ret2systems: What does it take to hack a @Sonos Era 300 for Pwn2Own? . Take a look at our process of adapting existing research, establ….
0
46
0
RT @NikolajSchlej: The embargo (12:00 UTC 2025-06-10) is over, let's start a thread on Hydroph0bia (CVE-2025-4275), a trivial SecureBoot an….
0
92
0
RT @xvonfers: 🔥🔥🔥.[$50000][386565144][maglev]Incorrect node replacement optimization during Maglev graph construction -> RCE..
0
8
0
RT @the_secret_club: Hypervisors for Memory Introspection and Reverse Engineering by @memn0ps .
0
127
0
RT @0xor0ne: Analysis of map related bugs in V8 Javascript engine. Credits @Nyaaaaa_ovo. #infosec #v8
https://t.co….
0
37
0
RT @malltos92: My new article "The Supply Chain is Fine" is out!. Great researchers, No deals, shrinking market - what could go wrong?. htt….
0
22
0
RT @linkersec: [CVE-2025-37752] Two Bytes Of Madness: Pwning The Linux Kernel With A 0x0000 Written 262636 Bytes Out-Of-Bounds. Great artic….
0
53
0
RT @dillon_franke: Thrilled to announce my new Project Zero blog post is LIVE! 🎉 I detail my knowledge-driven fuzzing process to find sandb….
0
108
0
RT @SecuriTeam_SSD: 🚨 New advisory was just published! 🚨. Two Use After Free (UAF) vulnerabilities were discovered within Chrome’s Browser….
0
22
0
RT @washi_dev: After #flareon11 challenge 7, I got inspired to build tooling for #dotnet Native AOT reverse engineering. As such, I built….
0
102
0