anyfun
@_Anyfun
Followers
368
Following
10K
Media
2
Statuses
44
[ZDI-25-1039|CVE-2025-12686] (Pwn2Own) Synology BeeStation Plus auth_info Stack-based Buffer Overflow Remote Code Execution Vulnerability (CVSS 9.8; Credit: @Tek_7987 and @_Anyfun (both working @Synacktiv))
zerodayinitiative.com
(Pwn2Own) Synology BeeStation Plus auth_info Stack-based Buffer Overflow Remote Code Execution Vulnerability
0
2
6
At #Pwn2Own2025, our experts @Tek_7987 & @_Anyfun remotely compromised a Synology Beestation Plus via a pre-auth exploit, leading to full system takeover. The vuln is now tracked as CVE-2025-12686 🔍 🔗 Full write-up:
synacktiv.com
Breaking the BeeStation: Inside Our Pwn2Own 2025 Exploit Journey
1
46
119
A big shout-out to the @Synacktiv team for their strong performance at the latest #Pwn2Own competition in Cork! They proudly secured third place overall 👏 Next stop: Tokyo for the upcoming edition 🇯🇵 👀 More details on the targets and participants here ℹ️
1
3
36
Congrats to @Tek_7987 and @_Anyfun for landing the first successful entry at #Pwn2OwnCork - exploiting a stack overflow on @Synology BeeStation Plus for $40,000 and 4 Master of Pwn points in the process 💥 Let’s keep pushing 💪 #P2OIreland #Synacktiv
1
11
57
Awesome!
🐝 Third time’s the charm for @Tek_7987 & @_Anyfun from @Synacktiv, who just stung the BeeStation Plus with a successful exploit. They're off to the disclosure room to explain how it happened. #Pwn2Own #P2OIreland
0
0
3
Let’s go!
The schedule for #Pwn2Own Ireland is now live! 53 entries from 25 teams over three days of excitement and pwnage. We'll be updating the schedule with live streaming information as we get them set up. https://t.co/wFKRtsqxjp
#P2OIreland
0
0
1
Userland iOS aficionados, I released a simple IDA plugin that should improve your Objective-C experience. For now it removes ARC function calls in decompiled code (eg objc_retain) and helps listing candidate callers to a method. Check it out at
github.com
IDA helper plugin to reverse engineer Objective-C code - synacktiv/objc-helper
The "Objective-C helper" IDA plugin presented during the @sth4ck talk "Demystifying Objective-C internals" given by @v1csec is now publicly available on GitHub at https://t.co/XVmzIkYwn6 The slides are also available on our website:
0
3
25
Gunshots pierce the night as a Tesla speeds away... lead the hunt for a covert criminal group in this year's @sstic challenge! We worked hard to design unique and thrilling puzzles. Join the chase starting today 16:00 GMT+1 at https://t.co/sKCakn6vXX !
0
14
19
Take the time to read our new #PluginFocus article. In this blog post, Arnaud Gatignol (@_anyfun) and Julien Staszewski (@_0perator) from the @thalium_team introduce ida kmdf, a tool that helps with your KMDF driver analysis. Read more 🌐 https://t.co/X7OFto3GI4
#idapro
0
20
43
Pensée pour Florent, Romain, Tristan, Baptiste, Guillaume et l’inévitable Valentino, tous restés au bercail en nous confiant un joli petit exploit.
0
0
0
Just leaving Toronto and pwn2own! What a blast we've had with Maxime T. Very good collective work @thalium_team
https://t.co/WXw8ZryycS
Proud of our #teamThales who were able to execute their exploit on the QNAP TS-464; We were delighted to participate to #PWN2OWN and hope to return next year for a new challenge!✅
1
0
4
0
11
45
As a treat before next week's talk at OffensiveCon by Guillaume & Quentin, here is an introduction to our recent findings on KSMBD. Enjoy, and see you in Berlin to all #OffensiveCon23 attendees! @offensive_con
https://t.co/jKsnK71RKU
blog.thalium.re
In this blogpost, we introduce the analysis of one SMB implementation: kSMBd. It will be followed up by a talk at OffensiveCon 2023 named “Abusing Linux in-kernel SMB server to gain kernel remote...
1
15
46
🛰️@esa has organised an unprecedented takeover of a demonstration satellite. The @thalesgroup's offensive #cybersecurity team took up the challenge by identifying vulnerabilities that could disrupt the operation of #ESA's satellite. #CYSAT
https://t.co/V0i88knbXZ
0
9
15
Abusing Linux In-Kernel SMB Server to Gain Kernel Remote Code Execution by @guteissier and @laomaiweng
https://t.co/3Jcbdf19eo
0
7
29
Upcoming batch of vulnerabilites on Linux & Canonical, stay tuned for details ...
0
17
158
Just pushed some homeworks about NT object access tracing through VMI : https://t.co/GZqVYZyjV5 Let me know if you enjoy it :)
0
0
5
WinDBG kd extension to speed up nt object research resolution by @thalium_team : https://t.co/ILxrGO0ts6
#SSTIC
github.com
Contribute to thalium/WinDbgFastObj development by creating an account on GitHub.
0
10
23
Windows Memory Introspection with IceBox https://t.co/4RPAOo9eOx
0
18
34