
Matt Buzanowski
@Mateusz_Jozef
Followers
1K
Following
4K
Media
14
Statuses
5K
Red Team Sr. Manager @ Equinix
Atlanta, GA
Joined August 2009
RT @zerodaytraining: š Our popular course āZero Day Vulnerability Researchā is scheduled for a major upgrade in 2024 Q2 (v0.1->v1.0). Newā¦.
0
1
0
RT @mrgretzky: š„ CYBER MONDAY 30% SALE š„. If you've missed the Black Friday sale, you can still get Evilginx Mastery at a discounted priceā¦.
0
8
0
RT @clintgibler: š Abusing Slack for Offensive Operations. Useful red team tactics. Slack stores user cookies in plaintext on disk ā impersā¦.
posts.specterops.io
Background
0
20
0
RT @vxunderground: We are giving away two vx-underground Black Mass Volume I and II bundles. In other words, winners will be given both volā¦.
0
66
0
RT @stephenfewer: Our @rapid7 AttackerKB analysis detailing CVE-2023-28771 is available. Unauthenticated command injection on the WAN interā¦.
attackerkb.com
CVE-2023-28771 is an unauthenticated command injection vulnerability affecting the WAN interface of several Zyxel network devices, as reported by TRAPA Securitā¦
0
36
0
RT @FuzzySec: For science and profit I wrote an exploit for CVE-2022-21882. It works on 10 and 11. It's a really good case-study on win32kā¦.
0
66
0
RT @adamdoupe: My second XNU security bug CVE-2023-23504, a 19-year old kernel heap underwrite that allows root to kernel escalation, was jā¦.
0
117
0
RT @trailofbits: Today, we are releasing RPC Investigator, made for exploring RPC clients and servers on Windows. This .NET application buiā¦.
blog.trailofbits.com
A new tool for Windows RPC research. Trail of Bits is releasing a new tool for exploring RPC clients and servers on Windows. RPC Investigator is a .NET application that builds on the NtApiDotNet...
0
160
0
RT @vplanta: After 20 years BugChecker is back! A SoftICE-like kernel debugger for Windows 11 (and Windows XP as well). Check it out: httpsā¦.
github.com
SoftICE-like kernel debugger for Windows 11. Contribute to vitoplantamura/BugChecker development by creating an account on GitHub.
0
97
0
RT @0xor0ne: Very cool writeup by @saidelike about exploiting CVE-2022-32250.Use-after-frees to bypass KASLR and kick off a ROP gadgets toā¦.
0
52
0
RT @yarden_shafir: Did you know you can mark things in WinDbg in different colors to keep track of repeated values? I find it super usefulā¦.
0
57
0
RT @alexjplaskett: š„ 1/ As promised here is the long blog write-up of a 6 year old Linux kernel UAF vulnerability (CVE-2022-32250) which weā¦.
0
124
0
RT @PortSwiggerRes: Hunting evasive vulnerabilities: finding flaws that others miss - from @albinowax - premiered at Nullcon Berlin. If youā¦.
portswigger.net
Do you ever wonder about the vulnerabilities you've missed? Why didn't they show themselves - and will they be discovered by somebody else later? Certain vulnerabilities have a knack for evading audit
0
141
0
RT @RolfRolles: My full-binary, static type reconstruction toolkit is becoming increasingly robust. Pictured are fully-automated results frā¦.
0
52
0
RT @thezdi: In our latest #MindShaRE blog, @_wmliang_ describes finding bugs in MySQL using the Clang Static Analyzer and CodeQL tools. Hisā¦.
zerodayinitiative.com
Recently, the ZDI received multiple submissions of vulnerabilities inĀ MySQL Cluster . MySQL Cluster is a clustering solution providing linear scalability and high availability for the MySQL database...
0
30
0
RT @thezdi: CVE-2021-44142: Details on a #Samba remote code execution bug demonstrated at #Pwn2Own Austin. An OOB heap read/write vuln wasā¦.
zerodayinitiative.com
Recently, Samba released a patch to address an Out-of-Bounds (OOB) Heap Read/Write vulnerability found in Samba versions prior to 4.13.17. This vulnerability was disclosed at Pwn2Own Austin 2021 by...
0
112
0
RT @vector35: 3.0: The Next Chapter. Today, weāre proud to announce the release of Binary Ninja 3.0. More than 6 months in the making, Binaā¦.
0
165
0