Phenol
@Phenol__
Followers
887
Following
2K
Media
1
Statuses
452
Former chemistry student. @42born2code student. Reversing and pwning stuffs at @RandoriSec.
Joined February 2018
An analysis of a recent 0-click exploit targeting Samsung devices: https://t.co/ChQTJY16QJ
4
147
447
I posted a short blog about how a Samsung GPU vulnerability (CVE-2025-21479) can be leveraged for an LPE on affected devices https://t.co/9tya9c37Ez
xploitbengineer.github.io
Motivation A couple of years ago, I picked up a few of Samsung S23’s at Pwn2Own.
6
80
252
@__sethJenkins broke kASLR by doing … nothing 😩 https://t.co/hxPzVTC1RN
1
26
102
More interposer fun, this time with DDR5 memory. Breaking TDX, SGX, SEV and even Nvidia TEEs. Checkout our work at https://t.co/Jl1dpGnM6J, and get a personally-signed Intel attestation report at @TEEdotFail.
45
84
346
thanks to everyone who attended my #TheSAS2025 talk "Typographic hit job: when fonts pull the trigger". 🙏 I've written an accompanying blogpost that goes over all the details:
haxx.in
Last year we (PHP HOOLIGANS) competed in Pwn2Own (ireland, 2024) once again. One of our (succesful) entries was against a little pet peeve target of mine, the CANON ImageCLASS printer. In this post...
4
42
136
I was glad to be back at #OBTS this year. It was another awesome edition of the conference. Thanks for joining my talk about Apple's novel #C1 baseband and thanks to @objective_see :) You can find the slides, a recording, and our tooling on my website. https://t.co/YkpmCqQRQO
lukasarnold.de
Learn more about my talk “What’s at the Bottom of the Sea, One Baseband? - Diving into the C1” at eight edition of the Objective by the Sea conference.
0
4
21
Serious bugs often occur in third-party components integrated by other software. @ifsecure and I found this vulnerability in the Dolby Unified Decoder. It affects Android, iOS and Windows among other platforms, sometimes 0-click. https://t.co/LchMIdKP0P
7
66
271
A technical look at @GrapheneOS Hardened Malloc, a memory allocator designed to mitigate heap corruption vulnerabilities (UAF, overflows) and break common exploit primitives. Deep dive for security researchers & exploit developers by @iksocin
https://t.co/99v99YQTdO
synacktiv.com
Exploring GrapheneOS secure allocator: Hardened Malloc
1
77
332
My research on CVE-2025-38352 (posix-cpu-timers TOCTOU Race condition) which was released in @Android Sept 2025 Bulletin, covering the internals, the patch-fix, vulnerability analysis, and a demo of a PoC that caused a crash in the Android kernel. Blog:
streypaws.github.io
An in-depth exploration of the Linux POSIX CPU Timer Subsystem, including patch analysis and vulnerability insights for Android Kernel CVE-2025-38352.
6
52
216
The two bytes that make size matter: Reverse engineering Apple's iOS 0-click CVE-2025-43300 improved bounds checking fix, by Madimodi Diawara https://t.co/EgSvDqoOEz
0
55
123
Documented instructions for setting up KGDB on Pixel 8. Including getting kernel log over UART via USB-Cereal, building/flashing custom kernel, breaking into KGDB via /proc/sysrq-trigger or by sending SysRq-G over serial, dealing with watchdogs, etc. https://t.co/vb4mgLDJrl
xairy.io
Instructions for getting kernel log, building custom kernel, and enabling KGDB on Pixel 8
5
141
468
Had a great time presenting at @reconmtl this weekend - always amazing meeting everyone and sharing research 🙌 For those that missed the conference, or just want to review my WhatsApp work, feel free to read the slides here & hmu if you have questions! https://t.co/ZyKfCh23vD
docs.google.com
Call, Crash, Repeat WhatsApp Hacking @datalocaltmp
5
74
277
Hexagon Fuzz: Full-System Emulated Fuzzing of Qualcomm Basebands by srlabs https://t.co/P21eZSxsmJ
2
33
100
Extracting Embedded MultiMediaCard (eMMC) contents in-system. ZDI researcher Dmitry Janushkevich details how to interact with an eMMC chip and notes some pitfalls you may encounter on the way.
zerodayinitiative.com
Every complex modern device needs non-volatile storage to keep program and configuration data while unpowered. There are several competing options on the market available to today’s systems designe...
1
37
99
Exploit write-ups for our 🚨latest 0-day🚨and the tragedy that swept the red black tree family dropping soon 👀 Here is a tiktok style video for those of you with no attention span thanks to slop and social media. Turn on the audio!!!
9
50
269
"Why is my exploit taking 10 minutes?" *checks logs* *sees 10,000 kernel warnings* "...oh" 💡 Fresh Friday night read: our intern, Tan Ze Jian, on Mali exploitation - sometimes the fix is simpler than you think! https://t.co/kIe2DTgFOU
starlabs.sg
As part of my internship at STAR Labs, I was tasked to conduct N-day analysis of CVE-2023-6241. The original PoC can be found here, along with the accompanying write-up. In this blog post, I will...
0
27
113
Our OffensiveCon talk on stateful baseband emulation (and how improper string handling led to baseband RCE) is available on YouTube: https://t.co/n8KqwHZ966. It has been a pleasure; awesome conference, brilliant people. Slides and paper:
0
12
47
In this post I'll use CVE-2023-6241, a vulnerability in the Arm Mali GPU that I reported last November to gain arbitrary kernel code execution from an untrusted app on a Pixel 8 with MTE enabled.
github.blog
In this post, I’ll look at CVE-2023-6241, a vulnerability in the Arm Mali GPU that allows a malicious app to gain arbitrary kernel code execution and root on an Android phone. I’ll show how this...
8
147
411