Phenol__ Profile Banner
Phenol Profile
Phenol

@Phenol__

Followers
887
Following
2K
Media
1
Statuses
452

Former chemistry student. @42born2code student. Reversing and pwning stuffs at @RandoriSec.

Joined February 2018
Don't wanna be here? Send us removal request.
@natashenka
Natalie Silvanovich
19 days
An analysis of a recent 0-click exploit targeting Samsung devices: https://t.co/ChQTJY16QJ
4
147
447
@XploitBengineer
Ben
2 months
I posted a short blog about how a Samsung GPU vulnerability (CVE-2025-21479) can be leveraged for an LPE on affected devices https://t.co/9tya9c37Ez
xploitbengineer.github.io
Motivation A couple of years ago, I picked up a few of Samsung S23’s at Pwn2Own.
6
80
252
@natashenka
Natalie Silvanovich
2 months
@__sethJenkins broke kASLR by doing … nothing 😩 https://t.co/hxPzVTC1RN
1
26
102
@DanielGenkin
Daniel Genkin
2 months
More interposer fun, this time with DDR5 memory. Breaking TDX, SGX, SEV and even Nvidia TEEs. Checkout our work at https://t.co/Jl1dpGnM6J, and get a personally-signed Intel attestation report at @TEEdotFail.
45
84
346
@bl4sty
blasty
2 months
thanks to everyone who attended my #TheSAS2025 talk "Typographic hit job: when fonts pull the trigger". 🙏 I've written an accompanying blogpost that goes over all the details:
Tweet card summary image
haxx.in
Last year we (PHP HOOLIGANS) competed in Pwn2Own (ireland, 2024) once again. One of our (succesful) entries was against a little pet peeve target of mine, the CANON ImageCLASS printer. In this post...
4
42
136
@lukasarnld
Lukas Arnold
2 months
I was glad to be back at #OBTS this year. It was another awesome edition of the conference. Thanks for joining my talk about Apple's novel #C1 baseband and thanks to @objective_see :) You can find the slides, a recording, and our tooling on my website. https://t.co/YkpmCqQRQO
Tweet card summary image
lukasarnold.de
Learn more about my talk “What’s at the Bottom of the Sea, One Baseband? - Diving into the C1” at eight edition of the Objective by the Sea conference.
0
4
21
@natashenka
Natalie Silvanovich
3 months
Serious bugs often occur in third-party components integrated by other software. @ifsecure and I found this vulnerability in the Dolby Unified Decoder. It affects Android, iOS and Windows among other platforms, sometimes 0-click. https://t.co/LchMIdKP0P
7
66
271
@Synacktiv
Synacktiv
3 months
A technical look at @GrapheneOS Hardened Malloc, a memory allocator designed to mitigate heap corruption vulnerabilities (UAF, overflows) and break common exploit primitives. Deep dive for security researchers & exploit developers by @iksocin https://t.co/99v99YQTdO
Tweet card summary image
synacktiv.com
Exploring GrapheneOS secure allocator: Hardened Malloc
1
77
332
@streypaws
Shreyas Penkar
4 months
My research on CVE-2025-38352 (posix-cpu-timers TOCTOU Race condition) which was released in @Android Sept 2025 Bulletin, covering the internals, the patch-fix, vulnerability analysis, and a demo of a PoC that caused a crash in the Android kernel. Blog:
streypaws.github.io
An in-depth exploration of the Linux POSIX CPU Timer Subsystem, including patch analysis and vulnerability insights for Android Kernel CVE-2025-38352.
6
52
216
@quarkslab
quarkslab
4 months
The two bytes that make size matter: Reverse engineering Apple's iOS 0-click CVE-2025-43300 improved bounds checking fix, by Madimodi Diawara https://t.co/EgSvDqoOEz
0
55
123
@andreyknvl
Andrey Konovalov
5 months
Documented instructions for setting up KGDB on Pixel 8. Including getting kernel log over UART via USB-Cereal, building/flashing custom kernel, breaking into KGDB via /proc/sysrq-trigger or by sending SysRq-G over serial, dealing with watchdogs, etc. https://t.co/vb4mgLDJrl
Tweet card summary image
xairy.io
Instructions for getting kernel log, building custom kernel, and enabling KGDB on Pixel 8
5
141
468
@datalocaltmp
Luke (datalocaltmp)
6 months
Had a great time presenting at @reconmtl this weekend - always amazing meeting everyone and sharing research 🙌 For those that missed the conference, or just want to review my WhatsApp work, feel free to read the slides here & hmu if you have questions! https://t.co/ZyKfCh23vD
Tweet card summary image
docs.google.com
Call, Crash, Repeat WhatsApp Hacking @datalocaltmp
5
74
277
@alexjplaskett
Alex Plaskett
6 months
Hexagon Fuzz: Full-System Emulated Fuzzing of Qualcomm Basebands by srlabs https://t.co/P21eZSxsmJ
2
33
100
@thezdi
Trend Zero Day Initiative
6 months
Extracting Embedded MultiMediaCard (eMMC) contents in-system. ZDI researcher Dmitry Janushkevich details how to interact with an eMMC chip and notes some pitfalls you may encounter on the way.
Tweet card summary image
zerodayinitiative.com
Every complex modern device needs non-volatile storage to keep program and configuration data while unpowered. There are several competing options on the market available to today’s systems designe...
1
37
99
@cor_ctf
Crusaders of Rust
6 months
Exploit write-ups for our 🚨latest 0-day🚨and the tragedy that swept the red black tree family dropping soon 👀 Here is a tiktok style video for those of you with no attention span thanks to slop and social media. Turn on the audio!!!
9
50
269
@starlabs_sg
starlabs
7 months
"Why is my exploit taking 10 minutes?" *checks logs* *sees 10,000 kernel warnings* "...oh" 💡 Fresh Friday night read: our intern, Tan Ze Jian, on Mali exploitation - sometimes the fix is simpler than you think! https://t.co/kIe2DTgFOU
Tweet card summary image
starlabs.sg
As part of my internship at STAR Labs, I was tasked to conduct N-day analysis of CVE-2023-6241. The original PoC can be found here, along with the accompanying write-up. In this blog post, I will...
0
27
113
@dfsec_com
Dataflow Security
7 months
Our new blog post is live:
blog.dfsec.com
Dataflow Security blog
2
84
262
@danielklischies
Daniel Klischies
7 months
Our OffensiveCon talk on stateful baseband emulation (and how improper string handling led to baseband RCE) is available on YouTube: https://t.co/n8KqwHZ966. It has been a pleasure; awesome conference, brilliant people. Slides and paper:
0
12
47
@mmolgtm
Man Yue Mo
2 years
In this post I'll use CVE-2023-6241, a vulnerability in the Arm Mali GPU that I reported last November to gain arbitrary kernel code execution from an untrusted app on a Pixel 8 with MTE enabled.
Tweet card summary image
github.blog
In this post, I’ll look at CVE-2023-6241, a vulnerability in the Arm Mali GPU that allows a malicious app to gain arbitrary kernel code execution and root on an Android phone. I’ll show how this...
8
147
411
@sth4ck
Sthack
8 months
❤️@RandoriSec is sponsoring the 2025 edition !
0
3
5