Minghao Lin Profile
Minghao Lin

@Y1nKoc

Followers
594
Following
1K
Media
9
Statuses
409

Security Researcher🤡 | iOS/macOS/Android Security

Joined September 2021
Don't wanna be here? Send us removal request.
@theevilbit
Csaba Fitzl
18 hours
🧵Apple just devalued full TCC bypasses from 30,5k to 5k. Hard to interpret this in a good way. It feels like - we admit we can’t fix this shit and we don’t care or at least not willing to pay for it - we don’t care about privacy https://t.co/jGd553oHw0
Tweet card summary image
security.apple.com
Browse the full list of eligible payouts through the Apple Security Bounty program before you submit a report.
10
34
214
@deepsec_cc
deepsec.cc
15 days
#deepsec 12/16/ 2025 "Do not omit function return values: Bug hunting and exploitation in the Kirin GPU kernel module" by @hzshang15 shows how missed return checks in Huawei Kirin GPU cause page UAF escalations, HKIP bypass, and EL1 code execution.
1
4
14
@deepsec_cc
deepsec.cc
15 days
#deepsec 12/16/2025 "Privilege Is the Prelude: Chaining an LPE to Two Root-Required Bugs for Full TCC on macOS" by @Y1nKoc @binary_fmyy @Mas0nShi will present a practical vulnerability chain that crosses the TCC boundary using 3 vulnerabilities.👉
1
10
33
@0xor0ne
0xor0ne
24 days
Exploiting NVIDIA's GPU Linux drivers https://t.co/IARbGJf0rQ Excellent blog post by Robin Bastide (@quarkslab) #infosec
5
43
229
@theevilbit
Csaba Fitzl
2 months
The slidedeck to our talk, Crash One: A Starbucks Story - CVE-2025-24277, with @gergely_kalman from @hexacon_fr and @objective_see #OBTS is available from the link below. It was a macOS vulnerability impacting the crash reporting process where we could achieve LPE and sandbox
1
26
86
@hhj4ck
Guanxing
2 months
New teardown: took apart an ‘iris-secured’ hardware wallet and found a bootloader issue plus a zero-biometric unlock path. https://t.co/4xLzduQ5OE
5
36
323
@rajxnull
Rajvardhan Agarwal
3 months
so excited to finally share something I’ve been working on alongside many brilliant colleagues. MTE will truly raise the bar for memory safety. https://t.co/KPyyJUbKPM
8
44
347
@u1f383
Pumpkin 🎃
5 months
A bit late, but I just published my blog post on bypassing Ubuntu’s sandbox! Hope you enjoy it! https://t.co/Q9Nra9n6N0
u1f383.github.io
5
114
392
@xvonfers
xvonfers
5 months
7
9
60
@0xor0ne
0xor0ne
5 months
Writeup on exploiting a heap overflow in Llama.cpp https://t.co/iUswoSCEhr #cybersecurity #llama
4
72
417
@chengyuzh
Chengyu Zhang
5 months
I'm looking for PhD students starting Fall 2026! If you're interested in automated testing and trustworthy program verification, feel free to reach out via email or come chat with me at ISSTA/FSE next week!
@chengyuzh
Chengyu Zhang
5 months
Excited to share that two of our papers will be presented next week: one at SIGMOD (Tuesday), and another at the FUZZING Workshop @ ISSTA (Saturday)! The student collaborators from @ECNUER will present the papers. I’ll be at ISSTA/FSE next week—come say hi! Looking forward to
3
11
42
@ri5255
r1ru
7 months
I've released a blog series about modern Linux kernel exploitation, where you can learn some advanced techniques used in real-world kernel exploits. Enjoy! https://t.co/26QCrgUxdb
4
268
992
@DarkNavyOrg
DARKNAVY
6 months
Meet our new buddy, Argusee — an AI-powered, automated vulnerability hunter that has already discovered 15+ vulnerabilities across projects, including a previously unknown Linux kernel flaw (CVE-2025-37891) enabling LPE. Demo and details: https://t.co/lkqcOYQhSy
1
32
121
@Y1nKoc
Minghao Lin
8 months
😬😬😬
4
0
12
@Y1nKoc
Minghao Lin
8 months
I got six CVEs and one acknowledgement. More on the way. I am planning to share these vulnerabilities. Stay tunned. 1. CVE-2025-24249; 2. CVE-2025-31182; 3. CVE-2025-24248; 4. CVE-2025-24205; 5. CVE-2025-24207; 6. CVE-2025-24170 Thanks @Mas0nShi @Lyutoon_ @binary_fmyy @PPPF00L
@_deven___
deven
8 months
🍎 Apple security releases today https://t.co/YWAUsDeu9H 📲 About the security content of iOS 18.4 and iPadOS 18.4 https://t.co/9Py4pNQge7 🖥️ About the security content of macOS Sequoia 15.4
5
9
142
@Y1nKoc
Minghao Lin
8 months
This jailbreak detection approach closely resembles the earlier method of identifying Cydia via deep links. Good job😂
@khanhduytran0
Duy Tran
8 months
Since the app exploiting it was leaked, I’m leaking the function they used. Don’t know if it’s exploitable on latest or not.
0
0
5
@khanhduytran0
Duy Tran
8 months
Since the app exploiting it was leaked, I’m leaking the function they used. Don’t know if it’s exploitable on latest or not.
@Little_34306
Huy Nguyen
8 months
For anyone interested in RE App link: https://t.co/M27du3Zgkj Console log (next image)
14
76
625
@h0mbre_
h0mbre
9 months
nice Linux kernel pwn challenge write up by @terawhiz for LACTF 2025. exploiting a 3 byte OOB write primitive https://t.co/keuUUdwOCl
1
49
243
@SpecterDev
Specter
9 months
I've published a write-up on reversing and analyzing Samsung's H-Arx hypervisor architecture for Exynos devices, which has had a lot of changes in recent years and pretty interesting design. Hope you all enjoy :) https://t.co/KTJ5IKfSfP
Tweet card summary image
dayzerosec.com
In many ways, mobile devices lead the security industry when it comes to defense-in-depth and mitigation. Over the years, it has been proven time and again that the kernel cannot be trusted to be...
3
113
504