KeyZ3r0 Profile Banner
k0shl Profile
k0shl

@KeyZ3r0

Followers
7K
Following
973
Media
30
Statuses
606

BOOMBAP!

China
Joined December 2016
Don't wanna be here? Send us removal request.
@KeyZ3r0
k0shl
2 months
New challenge coin in my showcase😆@msftsecresponse
3
0
57
@KeyZ3r0
k0shl
3 months
Our slide is online: https://t.co/vpdHxw7NV5 Glad to share our pre-auth DoS & RCE bug hunting research at #BHUSA! Thanks @BlackHatEvents for the pre-recording, as we couldn’t attend in person this time for personal reasons. Questions? DM us @vv474172261 @XiaoWei___ @edwardzpeng
7
57
185
@5aelo
Samuel Groß
4 months
We released our Fuzzilli-based V8 Sandbox fuzzer: https://t.co/eVkR1bl76n It explores the heap to find interesting objects and corrupts them in a deterministic way using V8's memory corruption API. Happy fuzzing!
Tweet card summary image
github.com
This is a basic fuzzer for the V8 Sandbox. It uses the memory corruption API to implement a random-but-deterministic (given a seed) traversal through the V8 heap object graph and corrupts some obje...
2
74
292
@KeyZ3r0
k0shl
4 months
Well. Happy to be on the MVRs annual list again and again — twice in a year 😂! Ended up #11. Thanks @msftsecresponse and congrats all!
@msftsecresponse
Microsoft Security Response Center
4 months
Our previously published Most Valuable Researchers (MVR) leaderboard contained inaccuracies due to technical issues on our end. We apologize for the error and have since resolved the issue. We’re now sharing a fully refreshed and accurate leaderboard. The Microsoft Researcher
2
0
20
@BlackHatEvents
Black Hat
4 months
During #BHUSA Briefing "Diving into Windows HTTP: Unveiling Hidden Preauth Vulnerabilities in Windows HTTP Services," we will discuss the different architectures of Windows HTTP services and share multiple previously undisclosed vulnerability cases and attacks. We will also
0
1
14
@KeyZ3r0
k0shl
4 months
Happy to make list again! Thank you @msftsecresponse and congrats all!
@msftsecresponse
Microsoft Security Response Center
4 months
The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s
1
1
24
@BlackHatEvents
Black Hat
6 months
In #BHUSA Briefings "Diving into Windows HTTP: Unveiling Hidden Preauth Vulnerabilities in Windows HTTP Services" where the speakers will discuss the different architectures of Windows HTTP services and share multiple previously undisclosed vulnerability cases and attacks. They
0
3
9
@KeyZ3r0
k0shl
6 months
Excited to announce our talk has been accepted by @BlackHatEvents #BHUSA!🥳🥳🥳 In my part of presentation, I’ll cover logic-based pre-auth remote vulnerabilities uncovered via novel abuse of Windows native HTTP API. Can't wait to see y'all in Las Vegas! https://t.co/XMIhb60Bqz
10
19
154
@deepsec_cc
deepsec.cc
7 months
[Official Announcement]: https://t.co/KYlSs1jYqJ 2025 IS COMING!!! This is a community-driven, non-profit information security closed-door symposium, where technology speaks loudest. 🌐 https://t.co/b53eHDnMgp 📅 June 16, 2025 📍 Shanghai, China 📧 x@deepsec.cc
0
11
35
@vv474172261
VictorV
9 months
I'm unable to join the conference Insomni’hack 2025, so I write a part of content into a blog, hope you enjoy my blog.
7
39
127
@starlabs_sg
starlabs
11 months
Think you’ve got what it takes to pop shells and snag your ticket to... @REverseConf and @offbyoneconf ? 😏 https://t.co/Bof9oxLd6z
1
46
138
@KeyZ3r0
k0shl
11 months
Received my MVR swag box at the last day of 2024, thank you @msftsecresponse ! And happy new year you all!
2
1
27
@starlabs_sg
starlabs
11 months
🎄 All I Want for Christmas is a CVE-2024-30085 Exploit 🎄 As always, we at @starlabs_sg are sharing what we learnt. This time, it's brought to you by Cherie-Anne Lee https://t.co/NHVNlLpwzU
Tweet card summary image
starlabs.sg
TLDR CVE-2024-30085 is a heap-based buffer overflow vulnerability affecting the Windows Cloud Files Mini Filter Driver cldflt.sys. By crafting a custom reparse point, it is possible to trigger the...
0
51
170
@FuzzySec
b33f | 🇺🇦✊
11 months
I have posted the slides for the talk @chompie1337 and I gave this past weekend at @h2hconference -> The Kernel Hacker’s Guide to the Galaxy: Automating Exploit Engineering Workflows #H2HC https://t.co/Cl8b58KkAv
17
218
747
@KeyZ3r0
k0shl
1 year
Finally received my PwnieAwards @PwnieAwards and a cute letter from @chompie1337 , thank you and @FuzzySec for congratulations and international delivery, it's definitely a milestone in my hacker's career. Just stay hungry and keep hunting!
5
9
156
@KeyZ3r0
k0shl
1 year
I definitely had some discussions with MSRC during this quarter period, I reported some logical based issues and shared how them work and why with them. Thanks MSRC and bounty team for their understanding, quick response and kind help as always.😄
@msftsecresponse
Microsoft Security Response Center
1 year
Shout out to our updated #10 rank, @KeyZ3r0! Thank you for your continued partnership with the MSRC and for your amazing communication!
1
0
22
@KeyZ3r0
k0shl
1 year
I'm happy to get BEST RCE as my first pwnie awards! A new archievement in my career. Thanks @PwnieAwards and CONGRATS to all pwnies, same to my friend @chompie1337 🥳🥳🥳
@mj0011sec
mj0011
1 year
Congrats @KeyZ3r0
1
8
100
@KeyZ3r0
k0shl
1 year
Glad to be #15 on overrall list and #6 on Windows list, thanks MSRC and bounty team as always. Congrats all on the list!
@msftsecresponse
Microsoft Security Response Center
1 year
The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s
3
0
28
@KeyZ3r0
k0shl
1 year
Nice work! I'm glad that my blog post could be a little helpful in inspiring the discovery of such a beautiful bug.😃😃
@chompie1337
chompie
1 year
I’m thrilled to share my latest blog post! This one focuses on the bug hunting process: inspiration, approach, and execution. I also provide a retrospective on how the bug was introduced and analyze the insufficient “patch”. Check it out:
1
1
25