Lays
@_L4ys
Followers
4K
Following
11K
Media
39
Statuses
2K
Co-Founder @TrapaSecurity & @pwnabletw/ MSRC Top 100 2019&2020 / Mobile & Windows Security
台灣
Joined January 2015
A bit late, but here's the talk I gave last year at CODE BLUE and HITCON, about the 20+ Trend Micro Apex One LPE that @0x000050 and I disclosed. https://t.co/EPlvjWSjzO
6
32
146
I've been working on a side project for some time: autonomous reverse-engineering powered by Gepetto. I shared some thoughts here ( https://t.co/EDHsSUWbQC), and am looking for beta testers to try out the platform. DM me or reply below if you are interested!
blog.kwiatkowski.fr
If there's one thing I've been passionate about throughout my career, it's reverse-engineering. I've also enjoyed teaching reverse-engineering for years, either in-person or when developing online...
4
37
161
How was a single heap overflow in an Audible parser enough to compromise an Amazon account? Find out in our latest blog post, in which we break down the Kindle vulnerabilities we reported earlier this year. https://t.co/v524qgdJca
blog.thalium.re
Although Kindle e-readers are a prime target in modding and jailbreaking communities, there is little public work about vulnerability research in remote code execution scenarios. In this post, we...
0
17
53
We're back, baby! This time with 19+ bugs I reported to MediaTek over the past year + PoCs for each one! I'll also tell you a *fun* story about MediaTek's "creative" impact assessment process. They earned a spot on the naughty list this year :) Check it ⬇️
7
28
177
The slide from my Pwn2Own QNAP NAS talk at AVTOKYO2025 was published on 11/26. But Ryuokyo Canyon was so beautiful that I completely forgot to post about it on X 😅. You can find the slide on the AVTOKYO website: https://t.co/R8hCyV2Sdl]
avtokyo.org
AVTOKYO 2025 (23rd Nov.) Timetable Main stage 内容の詳細はSpeakersページへ More details on the Speakers page 14:00-14:20 会場オープン Venue opening 14:20-14:30 オープニング Opening 14:30-15:00 [en] Enlightenment by...
1
15
65
An analysis of a recent 0-click exploit targeting Samsung devices: https://t.co/ChQTJY16QJ
4
147
447
All the bugs used for winning this were found with @theori_io 's fully automated security analysis tools (just upload code and get bugs!). For interested folks, check out https://t.co/vwMM9XJcAT 🤖💪
code.xint.io
Get early access to Xint Code, the AI-powered SAST engine that reads code like an attacker. Faster detection, actionable fixes, and real security insights.
Final day at https://t.co/pr7GC5uRqu was W1LD.🧑💻 Today’s successful exploits >> RCEs in Redis (x2), PostgreSQL, and MariaDB - all demonstrated live on stage. Congrats to XINT Code for being the https://t.co/pr7GC5uRqu CHAMPIONS!
6
22
142
My research regarding .NET Framework HTTP client proxies and WSDL imports just dropped. Long story short: those proxies can be forced to write HTTP body to the local files, instead of sending them over HTTP. Leads to shells 😅
Today, we’re releasing watchTowr Labs’ @chudyPB’s BlackHat .NET research, owning Barracuda, Ivanti and more solutions. Enjoy the read as Piotr explains a new .NET Framework primitive, used to achieve pre- and post-auth RCE on numerous enterprise appliances.
3
32
186
Over the weekend I wrote up a post about some weaknesses I identified when looking at LINE cryptography on Android 🤖🦃 Attacking LINE Cryptography for Fun and .. Forensics -> https://t.co/ONzj6gZgRs
2
17
67
My HEXACON talk video is out! It covers a small race condition in the Linux kernel’s io_uring. I recommend watching it at 1.25× speed since I’m still not great at speaking 😅 https://t.co/lMuweA7PyU Here is the slide! https://t.co/9jPoKMzxwL
4
46
148
Our research on AuthToken is now public. 🔓 Cracked Android lockscreen passwords on 8 phones from 7 vendors, and bypassed Gatekeeper & Credential Encryption. 📘 Slides are public and welcome discussions! ✍️ Blog is on the way. 💡Follow @DarkNavyOrg for more updates.
2
11
38
I've uploaded the slides of my recent talk "JS Engine Security in 2025": https://t.co/1znTdICVmY. I think there'll also be a recording available at some point (otherwise I can make one as not everything's in the slides). Thanks for the fantastic conference @POC_Crew!
4
57
220
Been waiting for this for so long... now we have Plugin Manager and officially built BinDiff/BinExport for 9.2 My suffering has ended.
⌨️ Introducing HCLI: The Modern Command-Line Interface for IDA. Automate workflows, simplify plugin development across platforms, manage licenses and more. https://t.co/1PWeVZmePY
1
9
67
I’ll be at CODE BLUE tomorrow. Check out our Cyber Range Exercise if you’re interested, and feel free to come say hi if you want to chat https://t.co/PMyIoD16O0
codeblue.jp
This is the detailed Contests/Workshops page. page.World leading security researchers will come together for this unique international talks in Tokyo November 18th to 19th 2025
0
2
25
I am the main developer fixing security issues in FFmpeg. I have fixed over 2700 google oss fuzz issues. I have fixed most of the BIGSLEEP issues. And i disagree with the comments @ffmpeg (Kieran) has made about google. From all companies, google has been the most helpfull & nice
94
209
4K
Windows: Administrator Protection Kerberos Certificate Authentication EoP
0
9
31
@__sethJenkins broke kASLR by doing … nothing 😩 https://t.co/hxPzVTC1RN
1
26
103
It’s time to publish the blog post about the bug that won at P2O Berlin 2025. Enjoy! With this post, I mark my last moment as a researcher at @oobs_io. I’m moving on to a new place for a fresh start.🔥🦎 https://t.co/PAdwKgeHuL
oobs.io
A deep-dive technical analysis of CVE-2025-50168, a Windows kernel vulnerability (Type Confusion in DirectComposition) presented at Pwn2Own Berlin 2025. This post details how a 4-byte OOB write is...
1
62
189
CVE slop
Here's an example of Google's AI reporting security vulnerabilities in this codec: https://t.co/CvGemnoUk9 We take security very seriously but at the same time is it really fair that trillion dollar corporations run AI to find security issues on people's hobby code? Then expect
13
21
457