anyfun Profile
anyfun

@_Anyfun

Followers
368
Following
10K
Media
2
Statuses
44

@synacktiv

Joined October 2011
Don't wanna be here? Send us removal request.
@TheZDIBugs
TheZDIBugs
3 days
[ZDI-25-1039|CVE-2025-12686] (Pwn2Own) Synology BeeStation Plus auth_info Stack-based Buffer Overflow Remote Code Execution Vulnerability (CVSS 9.8; Credit: @Tek_7987 and @_Anyfun (both working @Synacktiv))
Tweet card summary image
zerodayinitiative.com
(Pwn2Own) Synology BeeStation Plus auth_info Stack-based Buffer Overflow Remote Code Execution Vulnerability
0
2
6
@Synacktiv
Synacktiv
9 days
At #Pwn2Own2025, our experts @Tek_7987 & @_Anyfun remotely compromised a Synology Beestation Plus via a pre-auth exploit, leading to full system takeover. The vuln is now tracked as CVE-2025-12686 🔍 🔗 Full write-up:
Tweet card summary image
synacktiv.com
Breaking the BeeStation: Inside Our Pwn2Own 2025 Exploit Journey
1
46
119
@Synacktiv
Synacktiv
1 month
A big shout-out to the @Synacktiv team for their strong performance at the latest #Pwn2Own competition in Cork! They proudly secured third place overall 👏 Next stop: Tokyo for the upcoming edition 🇯🇵 👀 More details on the targets and participants here ℹ️
1
3
36
@Synacktiv
Synacktiv
2 months
Congrats to @Tek_7987 and @_Anyfun for landing the first successful entry at #Pwn2OwnCork - exploiting a stack overflow on @Synology BeeStation Plus for $40,000 and 4 Master of Pwn points in the process 💥 Let’s keep pushing 💪 #P2OIreland #Synacktiv
1
11
57
@_Anyfun
anyfun
2 months
Awesome!
@thezdi
Trend Zero Day Initiative
2 months
🐝 Third time’s the charm for @Tek_7987 & @_Anyfun from @Synacktiv, who just stung the BeeStation Plus with a successful exploit. They're off to the disclosure room to explain how it happened. #Pwn2Own #P2OIreland
0
0
3
@_Anyfun
anyfun
2 months
Let’s go!
@thezdi
Trend Zero Day Initiative
2 months
The schedule for #Pwn2Own Ireland is now live! 53 entries from 25 teams over three days of excitement and pwnage. We'll be updating the schedule with live streaming information as we get them set up. https://t.co/wFKRtsqxjp #P2OIreland
0
0
1
@v1csec
vic
6 months
Userland iOS aficionados, I released a simple IDA plugin that should improve your Objective-C experience. For now it removes ARC function calls in decompiled code (eg objc_retain) and helps listing candidate callers to a method. Check it out at
Tweet card summary image
github.com
IDA helper plugin to reverse engineer Objective-C code - synacktiv/objc-helper
@Synacktiv
Synacktiv
6 months
The "Objective-C helper" IDA plugin presented during the @sth4ck talk "Demystifying Objective-C internals" given by @v1csec is now publicly available on GitHub at https://t.co/XVmzIkYwn6 The slides are also available on our website:
0
3
25
@thalium_team
Thalium Team
2 years
Gunshots pierce the night as a Tesla speeds away... lead the hunt for a covert criminal group in this year's @sstic challenge! We worked hard to design unique and thrilling puzzles. Join the chase starting today 16:00 GMT+1 at https://t.co/sKCakn6vXX !
0
14
19
@HexRaysSA
Hex-Rays SA
2 years
Take the time to read our new #PluginFocus article. In this blog post, Arnaud Gatignol (@_anyfun) and Julien Staszewski (@_0perator) from the @thalium_team introduce ida kmdf, a tool that helps with your KMDF driver analysis. Read more 🌐 https://t.co/X7OFto3GI4 #idapro
0
20
43
@_Anyfun
anyfun
2 years
Pensée pour Florent, Romain, Tristan, Baptiste, Guillaume et l’inévitable Valentino, tous restés au bercail en nous confiant un joli petit exploit.
0
0
0
@_Anyfun
anyfun
2 years
Just leaving Toronto and pwn2own! What a blast we've had with Maxime T. Very good collective work @thalium_team https://t.co/WXw8ZryycS
@thalium_team
Thalium Team
2 years
Proud of our #teamThales who were able to execute their exploit on the QNAP TS-464; We were delighted to participate to #PWN2OWN and hope to return next year for a new challenge!✅
1
0
4
@offensive_con
offensivecon
3 years
2023 Linux Kernel RCEs by @guteissier and @laomaiweng now #OffensiveCon23
0
11
45
@thalium_team
Thalium Team
3 years
As a treat before next week's talk at OffensiveCon by Guillaume & Quentin, here is an introduction to our recent findings on KSMBD. Enjoy, and see you in Berlin to all #OffensiveCon23 attendees! @offensive_con https://t.co/jKsnK71RKU
blog.thalium.re
In this blogpost, we introduce the analysis of one SMB implementation: kSMBd. It will be followed up by a talk at OffensiveCon 2023 named “Abusing Linux in-kernel SMB server to gain kernel remote...
1
15
46
@thalesgroup
Thales Group
3 years
🛰️@esa has organised an unprecedented takeover of a demonstration satellite. The @thalesgroup's offensive #cybersecurity team took up the challenge by identifying vulnerabilities that could disrupt the operation of #ESA's satellite. #CYSAT https://t.co/V0i88knbXZ
0
9
15
@offensive_con
offensivecon
3 years
Abusing Linux In-Kernel SMB Server to Gain Kernel Remote Code Execution by @guteissier and @laomaiweng https://t.co/3Jcbdf19eo
0
7
29
@dustin_childs
The Dustin Childs
3 years
👀👀👀👀👀👀 https://t.co/MBHrL8VoWC
1
11
56
@thalium_team
Thalium Team
3 years
Upcoming batch of vulnerabilites on Linux & Canonical, stay tuned for details ...
0
17
158
@_Anyfun
anyfun
4 years
Just pushed some homeworks about NT object access tracing through VMI : https://t.co/GZqVYZyjV5 Let me know if you enjoy it :)
0
0
5
@thalium_team
Thalium Team
5 years
Windows Memory Introspection with IceBox https://t.co/4RPAOo9eOx
0
18
34