_4bhishek Profile Banner
nu1lptr Profile
nu1lptr

@_4bhishek

Followers
356
Following
2K
Media
8
Statuses
198

OnlyWindows

VTL 1
Joined June 2022
Don't wanna be here? Send us removal request.
@KeyZ3r0
k0shl
11 days
This month MSRC fixed my Windows Defender info leak vulnerability CVE-2025-62468, but all acknowledgments are incorrect. First, I provided a working exploit, so it’s not “exploitable unlikely.”😅 https://t.co/TXNxu8XPjU
5
15
176
@f00fc7c800
f00fc7c800
18 days
Releasing a 3 linux kernel bugs chains to do secure comm app using side channel to establish key and establish covert channe: CVE-2023-1206+CVE-2025-40040+CVE-2024-49882 https://t.co/PklpQLbjrZ Anyways a little thread about this later this week :1/n
3
15
101
@alisaesage
Alisa Esage Шевченко
1 month
Confidence from the first principles https://t.co/TSVrxnIFa8 A hacker’s systematic perspective on how genuine confidence works - and how to build it
0
7
64
@d4m0n_8
D4m0n
2 months
It’s time to publish the blog post about the bug that won at P2O Berlin 2025. Enjoy! With this post, I mark my last moment as a researcher at @oobs_io. I’m moving on to a new place for a fresh start.🔥🦎 https://t.co/PAdwKgeHuL
oobs.io
A deep-dive technical analysis of CVE-2025-50168, a Windows kernel vulnerability (Type Confusion in DirectComposition) presented at Pwn2Own Berlin 2025. This post details how a 4-byte OOB write is...
1
62
189
@crowdfense
Crowdfense
4 months
Technical deep-dive into CVE-2025-53149, a heap-based buffer overflow in the Windows Kernel Streaming WOW Thunk Service driver (ksthunk.sys). https://t.co/KJ08k0EHKm
Tweet card summary image
crowdfense.com
Technical deep-dive into CVE-2025-53149, a heap-based buffer overflow in the Windows Kernel Streaming WOW Thunk Service driver (ksthunk.sys).
0
36
119
@cplearns2h4ck
chiefpie
4 months
Some of my bugs are patched in this month's patch tuesday, including the ones I used for Pwn2Own Berlin 2025. CVE-2025-50167 Race UAF in Hyper-V
9
37
386
@d4m0n_8
D4m0n
4 months
My first Pwn2Own 2025 Berlin vulnerability has finally been patched! Curious about how I exploited it? Keep an eye out as I’m preparing a blog post! https://t.co/FGngXd0Lyq
3
11
124
@betarixm
beta
4 months
Confirmed! — AIxCC 1st Place 🏆
3
3
37
@streypaws
Shreyas Penkar
5 months
Inspired by @__sethJenkins's cool research on the adsprpc driver in Android, I took a deep dive into the codebase and documented the internal workings of the @Qualcomm DSP Kernel Driver (FastRPC implementation). Blog:
streypaws.github.io
In depth internals on Qualcomm DSP Kernel (FastRPC implementation)
1
38
114
@0x_shaq
faulty *ptrrr
5 months
it’s not over until it’s over
1
2
48
@ENKI_official_X
ENKI WhiteHat
5 months
Curious how the Codegate 2025 FullChain was meant to be pwned? From RCE to SBX to LPE... the path to SYSTEM is now public. Official write-up is live! #pwn #CTF #Codegate #RCE #SBX #LPE https://t.co/9p7wUFCjnI
0
38
91
@f00fc7c800
f00fc7c800
5 months
Small teaser , location is Timisoara, Romania but venue is not yet decided till I have all the people confirmed :) please register only if you consider coming physically . it's just one stage no qualifier. More to be revealed soon :)
16
9
32
@hackyboiz
hackyboiz
5 months
[Research] CVE-2025-24985: Windows Fast FAT Driver RCE Vulnerability https://t.co/N0ttHnqTe1 The vulnerability was caused by the ability to control five variables within the VHD file that determine the number of clusters.
2
39
110
@cplearns2h4ck
chiefpie
5 months
This is an analysis of a recent clfs nday bug exploited ITW by Storm-2460, analyzed by my other intern. Hope you enjoy the post🙌
@starlabs_sg
starlabs
5 months
CASE CLOSED: CVE-2025-29824 0 public samples, 0 information Suspect: Windows CLFS driver Crime: UAF leading to Privilege Escalation Status: ACTIVELY EXPLOITED ITW Investigation: Debugged and documented Case files: https://t.co/Ig6RbvhLmZ Done by our intern, Ong How Chong
1
9
63
@0x_shaq
faulty *ptrrr
5 months
send this vid to your teammate every time they find a bug
5
11
57
@streypaws
Shreyas Penkar
6 months
Inspired by @ret2happy's excellent @BugsAggregator, I built a simple tracker for recent Chrome Releases that automatically identifies the patch commit for undisclosed issues. Blog: https://t.co/RzK53rK2Qc Tool:
0
5
36
@0x_shaq
faulty *ptrrr
6 months
created a X community let's see how it goes. if you don't share this to at least 3 people you'll have bad luck https://t.co/Vr9lah5Lr8
Tweet card summary image
twitter.com
it’s not segfault, it’s your fault 🫵
3
6
18
@_nwodtuhs
Charlie Bromberg « Shutdown »
6 months
On Saturday 28th, 7pm, I will be giving a talk at @_leHACK_, on how @MrAle_98 and I implemented DCShadow in Python, and how this was the worst project idea 🥲 code will be released publicly then 📥
1
3
32