Void_Sec Profile Banner
Paolo Stagno (VoidSec) Profile
Paolo Stagno (VoidSec)

@Void_Sec

Followers
5K
Following
3K
Media
231
Statuses
2K

Director of Research @Crowdfense. Windows Vulnerability Researcher and Exploit Developer, ex-@XI_Research

ntoskrnl.exe
Joined November 2013
Don't wanna be here? Send us removal request.
@Void_Sec
Paolo Stagno (VoidSec)
23 days
Another one bite the dust.
@crowdfense
Crowdfense
23 days
The following vulnerabilities have been added to our feed:.- CVE-2025-32756: multiple Fortinet products Buffer Overflow RCE.- CVE-2025-47955: Windows RasMan LPE.- CVE-2025-1758: Kemp LoadMaster Stack Overflow DoS.
0
1
11
@Void_Sec
Paolo Stagno (VoidSec)
1 month
RT @crowdfense: Crowdfense is ready for @TheOffensiveX in Athens!.Meet us at our stand to talk 0-days, research and offensive security. Let….
0
2
0
@Void_Sec
Paolo Stagno (VoidSec)
1 month
Enjoy these, they’re the only bugs we give away for free. Everything else goes through our bug bounty program 🐛.
@crowdfense
Crowdfense
1 month
Shiny bug stickers? We’ve got them. They’re waiting for you at our stand at @TheOffensiveX, starting tomorrow! 🪲
Tweet media one
1
0
7
@Void_Sec
Paolo Stagno (VoidSec)
1 month
RT @crowdfense: 20 years of a great conference and community, don't miss it!.
0
1
0
@Void_Sec
Paolo Stagno (VoidSec)
2 months
Touched down in Berlin! So hyped for @offensive_con, who else is here? Let's connect and chat all things VR/ED.
0
1
24
@Void_Sec
Paolo Stagno (VoidSec)
2 months
New post from the team!.
@crowdfense
Crowdfense
2 months
Read our newest blog-post on CVE-2024-11477, a buffer overflow vulnerability in 7-Zip's ZSTD decompression algorithm; explore the technical details:
0
4
25
@Void_Sec
Paolo Stagno (VoidSec)
3 months
RT @justandrijana: At #SAFACon2025 we hosted the 1st-ever Security Panel to discuss key topics in our industry and it was a great success!….
0
8
0
@Void_Sec
Paolo Stagno (VoidSec)
3 months
RT @crowdfense: As part of our n-day feed for both red and blue teams.
0
1
0
@Void_Sec
Paolo Stagno (VoidSec)
3 months
RT @justandrijana: Taking off to Seoul! See you at #Zer0con2025 in a bit ☺️ @POC_Crew .@f_roncari @lpontorieri @Void_Sec .
0
3
0
@Void_Sec
Paolo Stagno (VoidSec)
4 months
Let's go, more weaponized CVEs got added to the feed :).
@crowdfense
Crowdfense
4 months
The following CVEs have been added to our n-day feed:.- CVE-2024-38189: Microsoft Project Improper Input Validation RCE.- CVE-2024-43454 Microsoft Windows Remote Desktop Licensing Service Relative Path Traversal Arbitrary File Deletion.
0
2
16
@Void_Sec
Paolo Stagno (VoidSec)
4 months
Amazing blog post on HVCI and kCET, must read.
@slowerzs
Nathan Blondel
4 months
Think HVCI and kCET mean the end of kernel code execution? I wrote a blogpost exploring an alternative way to execute a kernel payload! :).
0
2
29
@Void_Sec
Paolo Stagno (VoidSec)
4 months
RT @POC_Crew: [#Zer0Con2025] Gold Sponsor. @crowdfense is the go-to, trusted partner for top-tier zero-day exploits!.Submit your vulnerabil….
0
2
0
@Void_Sec
Paolo Stagno (VoidSec)
4 months
RT @phrack: We heard you needed some more time, so we wanted to let you cook. We decided to push the Phrack 72 CFP deadline back until Ju….
0
182
0
@Void_Sec
Paolo Stagno (VoidSec)
4 months
RT @MrAle_98: Hey there,. Finally published the article on the exploit for CVE-2025-21333-POC exploit. Here the link to the article: https….
0
149
0
@Void_Sec
Paolo Stagno (VoidSec)
5 months
Proud of the team and all the work done so far.
@crowdfense
Crowdfense
5 months
Crowdfense's N-Day Vulnerability Intelligence Feed is live! A must-have for red and blue teams, delivering real-time insights and exploit code for actively exploited N-days. Enhance your adversary simulation & stay ahead. 🔗
2
2
24
@Void_Sec
Paolo Stagno (VoidSec)
5 months
Totally agree on this take.
@HaifeiLi
Haifei Li
5 months
"$100,000 for an Office 365 application. Microsoft Office-based targets will have Protected View enabled where applicable". I'm not saying ZDI can't do this (it's their money), but this is really and proven unrealistic (look nobody participated in Office category before). This.
0
2
4
@Void_Sec
Paolo Stagno (VoidSec)
5 months
RT @alisaesage: How to choose a research target [0-day hunting & exploit development]
Tweet media one
Tweet media two
0
65
0
@Void_Sec
Paolo Stagno (VoidSec)
5 months
One of the most interesting analysis I've ever seen.
@inversecos
inversecos
5 months
How the NSA (Equation Group) allegedly hacked into China's Polytechnical University 👀. I analysed intelligence reports from Chinese cyber firms (360, Pangu, CVERC) to aggregate TTPs attributed to Equation Group. 🔗
Tweet media one
0
1
5
@Void_Sec
Paolo Stagno (VoidSec)
5 months
Ah man, amazing! That's a childhood dream.
@x86matthew
x86matthew
5 months
Another pointless weekend project - a playable version of the old 3DMaze screensaver from Windows 9x. I reverse-engineered the original screensaver binary and added user-input functionality for the controls (and fixed some other minor issues!).
0
0
7
@Void_Sec
Paolo Stagno (VoidSec)
5 months
That's amazing! I've always wanted to give it a go but never tried: RCE on GameBoy color.
0
18
66