FuzzySec Profile Banner
b33f | 🇺🇦✊ Profile
b33f | 🇺🇦✊

@FuzzySec

Followers
33K
Following
14K
Media
1K
Statuses
10K

意志 / Antiquarian @ IBM X-Force / Ex-TORE ⚔️🦅 / I rewrite pointers and read memory / AI Psychoanalyst / Teaching @CalypsoLabs

Jumanji
Joined April 2012
Don't wanna be here? Send us removal request.
@FuzzySec
b33f | 🇺🇦✊
9 days
After a successful BlackHat US with so many amazing talks, I'm excited to share that I am also joining BlackHat EU as a guest on the review board for the AI, Vulnerability Research and AppSec tracks 🎊❤️‍🔥. The CFP closes on the 11th of Aug, get submitting:.
5
2
76
@FuzzySec
b33f | 🇺🇦✊
2 hours
RT @thatjiaozi: As promised Blogpost is here! . I find that a lot of the times people ask “how can researchers find complex bugs”. This is….
Tweet card summary image
bughunters.google.com
This blog post describes the journey of discovering a VM escape bug with the goal of demystifying the security research process and demonstrating how persistence and pivoting can lead to achieving...
0
56
0
@FuzzySec
b33f | 🇺🇦✊
17 hours
RT @watchtowrcyber: We’re expanding the phorce globally - and within watchTowr Labs, we’re always hiring. We’re looking for hands on skills….
0
17
0
@FuzzySec
b33f | 🇺🇦✊
17 hours
My faith has been somewhat restored by this post and the comments. For sure ThinkPads are the superior laptop choice, though we can debate what you install on it 😅.
@Adityapandeydev
Adith
2 days
The best decision you’ll ever make is to invest in a ThinkPad.
Tweet media one
5
0
26
@FuzzySec
b33f | 🇺🇦✊
21 hours
RT @HacksInTaiwan: 帶著講者玩台灣!HITCON 2025 City Tour 出發~. 繼去年宜蘭釀酒莊園、平溪天燈的美好回憶,今年我們當然不會缺席 🙌.今天是 Day3 天氣晴朗,是 City Tour 的好日子呢!. HITCON… https://t.….
0
2
0
@FuzzySec
b33f | 🇺🇦✊
3 days
RT @Xbow: 1/ XBOW Unleashes GPT-5’s Hidden Hacking Power. @OpenAI's initial assessment of GPT-5 showed modest cyber capabilities. But when….
0
231
0
@FuzzySec
b33f | 🇺🇦✊
3 days
RT @SinSinology: enojoy the writeup folks ^-^, this was some fun reversing, as always, another falls!
0
5
0
@FuzzySec
b33f | 🇺🇦✊
4 days
RT @carrot_c4k3: finally got around to writing up my windows exploit from pwn2own vancouver 2024! (plus some notes about using it on xbox)….
0
90
0
@FuzzySec
b33f | 🇺🇦✊
4 days
RT @sherpasecmy: 💥 Want to take the global stage and represent ASEAN at the International Cybersecurity Challenge (ICC) 2025? AJCCBC, with….
0
6
0
@FuzzySec
b33f | 🇺🇦✊
4 days
RT @Icemoonhsv: Check out my new blog on nested app authentication and brokered authentication.
0
18
0
@FuzzySec
b33f | 🇺🇦✊
5 days
RT @POC_Crew: 📢 The wait is almost over. POC2025 speaker 1st line-up & Registration .drops on September 1. Stay tuned and follow us 👉 .h….
0
3
0
@FuzzySec
b33f | 🇺🇦✊
5 days
RT @tjbecker_: @theori_io's AIxCC CRS has already found dozens of 0day vulnerabilities, and we've barely scratched the surface! The best pa….
0
33
0
@FuzzySec
b33f | 🇺🇦✊
6 days
RT @0x_shaq: Dropped a new blogpost. CVE-2025-52970: how I turned a limited, blind OOB read primitive into a full authentication bypass in….
Tweet card summary image
pwner.gg
Hello world! long time no see. I was so busy, mainly with working on symbol.exchange (btw opened a new “Bug Driven Development” community) and started to try my way in academia.
0
88
0
@FuzzySec
b33f | 🇺🇦✊
6 days
RT @lukOlejnik: Chinese scientists have developed the best shortest-path algorithm in 41 years! A team from Tsinghua University has broken….
0
2K
0
@FuzzySec
b33f | 🇺🇦✊
6 days
RT @bohops: And finally patched. CVE-2025-53769: Windows Security App Spoofing Vulnerability.
0
18
0
@FuzzySec
b33f | 🇺🇦✊
6 days
RT @5aelo: Some personal news: I'm thrilled to be moving back to Project Zero! Specifically I'll be joining the Big Sleep project to find v….
0
36
0
@FuzzySec
b33f | 🇺🇦✊
7 days
RT @cr0wtom: After three days of non stop hacking, no sleep, and a lot of caffeine, I am honored to share that WE WON THE @defcon @CarHackV….
0
8
0
@FuzzySec
b33f | 🇺🇦✊
7 days
RT @tylerni7: LLM skeptics (or LLM curious folks) should read through @theori_io 's blog walking through what our LLM agents accomplished i….
Tweet card summary image
theori.io
Agent trajectory walkthroughs of a fully autonomous hacking system | AI for Security, AIxCC
0
27
0
@FuzzySec
b33f | 🇺🇦✊
9 days
I want to extend the same offer as I did for BlackHat US and make myself available to provide structural and language feedback on proposals from people that use English as a second language (ESL). From my own experience I know it's not always easy to navigate what a good proposal.
1
0
12
@FuzzySec
b33f | 🇺🇦✊
9 days
RT @KeyZ3r0: Our slide is online: Glad to share our pre-auth DoS & RCE bug hunting research at #BHUSA! Thanks @Bla….
0
56
0