Pwn Live Profile
Pwn Live

@PwnLive_

Followers
95
Following
224
Media
14
Statuses
83

Streaming en español, sobre reversing, exploiting, programación y hacking en general... https://t.co/yNLkTS3T6l https://t.co/EL94BRXIe8

Joined July 2023
Don't wanna be here? Send us removal request.
@PwnLive_
Pwn Live
2 years
El día 16 estaremos con Pablo Aravena, donde nos contará sobre su investigación en un dron comercial que realizó. Nos vemos a las 21hs GMT-3 en: https://t.co/YZgVY4w4v0
0
1
4
@5mukx
Smukx.E
1 month
EDR Analysis: Leveraging Fake DLLs, Guard Pages, and VEH for Enhanced Detection https://t.co/ZzjOqqeNhf
2
58
267
@stephenfewer
Stephen Fewer
1 month
Very nice, STAR Labs were able to leverage the auth bypass (CVE-2024-51978) and stack buffer overflow (CVE-2024-51979) we disclosed earlier this year, for unauth RCE against a Brother MFC-J1010DW, by chaining to a firmware downgrade bug 🔥
@starlabs_sg
starlabs
1 month
🖨️ Brother, can you spare us a root shell? We were ready for Pwn2Own but they patched it on the LAST DAY of registration 😭 Hope you enjoy this new blog post from us. 📖
1
4
54
@ShitSecure
S3cur3Th1sSh1t
1 month
Another Nim C2-Framework developed by @virtualloc. Can't believe you actually wrote the whole client in Nim as well 😂 Nice one! https://t.co/2rPGuqzbqr Including a Blog for parts of it: https://t.co/YvVxQpEjFG
5
77
279
@xvonfers
xvonfers
1 month
exploited in v8ctf
@xvonfers
xvonfers
2 months
(CVE-2025-10891)[443765373][ignition]Integer Overflow https://t.co/NIGVYJcRT5 https://t.co/ofvwHiSQrd Reported by Google Big Sleep
0
4
32
@cl4sm
Wil Gibbs
4 months
While playing @defcon CTF Finals with @shellphish I managed to solve the ICO challenge using LLMs (GPT5 + Cursor) and almost no human intervention. You can read how I did it here!
wilgibbs.com
DEF CON CTF Every year world-class teams play difficult CTFs such as Plaid CTF and HITCON CTF in an attempt to qualify for DEF CON CTF by getting first place. There are usually only 3-4 CTFs a year...
6
113
381
@0xor0ne
0xor0ne
1 month
"LLMs Solving a DEF CON CTF Finals Challenge" https://t.co/CukMcY6Jb4 Credits @cl4sm #infosec
2
87
395
@nyan_satan
john
1 month
It's been a long time since I published a write-up, so... Here's my little article about log strings obfuscation in modern iBoot and 2 methods I found to (partially) deobfuscate them Read on your own risk! https://t.co/rbkLhuVE3O
2
27
290
@Synacktiv
Synacktiv
1 month
Following their presentation at @hexacon_fr, Mehdi & Etienne detail how they exploited CVE-2023-40129, a critical vulnerability affecting the Bluetooth stack in Android ⬇️ https://t.co/OS63LQ4tJE
Tweet card summary image
synacktiv.com
Paint it blue: Attacking the bluetooth stack
0
52
146
@kmkz_security
kmkz
1 month
Cracking the Pixel 8: Exploiting the Undocumented DSP to Bypass MTE - @Peterpan980927 @st424204 from @starlabs_sg https://t.co/BBogFGPjWc
1
47
194
@0xWasp_
Junior Mateus
1 month
Sunday morning fun ☺️☺️
3
25
300
@MetroplexGOS
MetropleX | GrapheneOS | metroplex.bot
1 month
Team Z3 at Pwn2Own Ireland found that WhatsApp 0click 0day RCE exploit. Meanwhile GrapheneOS with MTE enabled for user installed apps shows:
13
97
1K
@Steph3nSims
Stephen Sims
2 months
Fantastic @offby1security session with @leonjza on finding bugs in Windows bloatware. It's available on YouTube here:
0
18
73
@chompie1337
chompie
2 months
bring your eol exploits to @districtcon junkyard! now’s the time to flex yr cute demo
1
19
102
@antoniosarosi
Antonio Sarosi
2 months
I am 100% cooked at this point.
6
4
116
@0xor0ne
0xor0ne
2 months
Valve Anti-Cheat (VAC) reverse engineering https://t.co/91BDzimWW6 #infosec
6
90
800
@netspooky
Battle Programmer Yuu
3 months
There's a sick linenoise article by @iximeow in @phrack 71 called "Learning An ISA By Force Of Will", where ixi goes from unknown binary blob, to manual instruction decoding, to figuring out control flow, and gives a critique of the RE'd ISA. https://t.co/LK4R6e6lUI
phrack.org
Click to read the article on phrack
@lauriewired
LaurieWired
3 months
How do you program an unknown CPU? The original specs are gone; no compilers exist, and the ISA is completely unrecognized. It happens more often than you think, behind very closed doors. It's almost always military hardware.
4
33
158
@R00tkitSMM
Meysam
3 months
I’ve brought you a real iOS MTE bypass retrospectively: the overflow happens inside the co-processor (no MTE), then abuses trusted RPCs to gain kernel R/W — sidestepping MTE on the AP entirely. https://t.co/r54afStxXb
5
52
322