Lays Profile
Lays

@_L4ys

Followers
4K
Following
11K
Media
39
Statuses
2K

Co-Founder @TrapaSecurity & @pwnabletw/ MSRC Top 100 2019&2020 / Mobile & Windows Security

台灣
Joined January 2015
Don't wanna be here? Send us removal request.
@_L4ys
Lays
1 year
A bit late, but here's the talk I gave last year at CODE BLUE and HITCON, about the 20+ Trend Micro Apex One LPE that @0x000050 and I disclosed. https://t.co/EPlvjWSjzO
6
32
146
@JusticeRage
Ivan Kwiatkowski
8 days
I've been working on a side project for some time: autonomous reverse-engineering powered by Gepetto. I shared some thoughts here ( https://t.co/EDHsSUWbQC), and am looking for beta testers to try out the platform. DM me or reply below if you are interested!
Tweet card summary image
blog.kwiatkowski.fr
If there's one thing I've been passionate about throughout my career, it's reverse-engineering. I've also enjoyed teaching reverse-engineering for years, either in-person or when developing online...
4
37
161
@thalium_team
Thalium Team
6 days
How was a single heap overflow in an Audible parser enough to compromise an Amazon account? Find out in our latest blog post, in which we break down the Kindle vulnerabilities we reported earlier this year. https://t.co/v524qgdJca
Tweet card summary image
blog.thalium.re
Although Kindle e-readers are a prime target in modding and jailbreaking communities, there is little public work about vulnerability research in remote code execution scenarios. In this post, we...
0
17
53
@hyprdude
hypr
7 days
We're back, baby! This time with 19+ bugs I reported to MediaTek over the past year + PoCs for each one! I'll also tell you a *fun* story about MediaTek's "creative" impact assessment process. They earned a spot on the naughty list this year :) Check it ⬇️
7
28
177
@YingMuo
YingMuo
11 days
The slide from my Pwn2Own QNAP NAS talk at AVTOKYO2025 was published on 11/26. But Ryuokyo Canyon was so beautiful that I completely forgot to post about it on X 😅. You can find the slide on the AVTOKYO website: https://t.co/R8hCyV2Sdl]
avtokyo.org
AVTOKYO 2025 (23rd Nov.) Timetable Main stage 内容の詳細はSpeakersページへ More details on the Speakers page 14:00-14:20 会場オープン Venue opening 14:20-14:30 オープニング Opening 14:30-15:00 [en] Enlightenment by...
1
15
65
@natashenka
Natalie Silvanovich
10 days
An analysis of a recent 0-click exploit targeting Samsung devices: https://t.co/ChQTJY16QJ
4
147
447
@tylerni7
tylerni7
11 days
All the bugs used for winning this were found with @theori_io 's fully automated security analysis tools (just upload code and get bugs!). For interested folks, check out https://t.co/vwMM9XJcAT 🤖💪
Tweet card summary image
code.xint.io
Get early access to Xint Code, the AI-powered SAST engine that reads code like an attacker. Faster detection, actionable fixes, and real security insights.
@wiz_io
Wiz
11 days
Final day at https://t.co/pr7GC5uRqu was W1LD.🧑‍💻 Today’s successful exploits >> RCEs in Redis (x2), PostgreSQL, and MariaDB - all demonstrated live on stage. Congrats to XINT Code for being the https://t.co/pr7GC5uRqu CHAMPIONS!
6
22
142
@chudyPB
Piotr Bazydło
12 days
My research regarding .NET Framework HTTP client proxies and WSDL imports just dropped. Long story short: those proxies can be forced to write HTTP body to the local files, instead of sending them over HTTP. Leads to shells 😅
@watchtowrcyber
watchTowr
12 days
Today, we’re releasing watchTowr Labs’ @chudyPB’s BlackHat .NET research, owning Barracuda, Ivanti and more solutions. Enjoy the read as Piotr explains a new .NET Framework primitive, used to achieve pre- and post-auth RCE on numerous enterprise appliances.
3
32
186
@maple3142
maple3142
18 days
A POC for CVE-2025-55182 https://t.co/BcyJ1UbivA
34
434
2K
@FuzzySec
b33f | 🇺🇦✊
21 days
Over the weekend I wrote up a post about some weaknesses I identified when looking at LINE cryptography on Android 🤖🦃 Attacking LINE Cryptography for Fun and .. Forensics -> https://t.co/ONzj6gZgRs
2
17
67
@u1f383
Pumpkin 🎃
28 days
My HEXACON talk video is out! It covers a small race condition in the Linux kernel’s io_uring. I recommend watching it at 1.25× speed since I’m still not great at speaking 😅 https://t.co/lMuweA7PyU Here is the slide! https://t.co/9jPoKMzxwL
4
46
148
@xgxiao66
Xg Xiao
29 days
Our research on AuthToken is now public. 🔓 Cracked Android lockscreen passwords on 8 phones from 7 vendors, and bypassed Gatekeeper & Credential Encryption. 📘 Slides are public and welcome discussions! ✍️ Blog is on the way. 💡Follow @DarkNavyOrg for more updates.
2
11
38
@5aelo
Samuel Groß
29 days
I've uploaded the slides of my recent talk "JS Engine Security in 2025": https://t.co/1znTdICVmY. I think there'll also be a recording available at some point (otherwise I can make one as not everything's in the slides). Thanks for the fantastic conference @POC_Crew!
4
57
220
@_L4ys
Lays
1 month
Been waiting for this for so long... now we have Plugin Manager and officially built BinDiff/BinExport for 9.2 My suffering has ended.
@HexRaysSA
Hex-Rays SA
1 month
⌨️ Introducing HCLI: The Modern Command-Line Interface for IDA. Automate workflows, simplify plugin development across platforms, manage licenses and more. https://t.co/1PWeVZmePY
1
9
67
@_L4ys
Lays
1 month
I’ll be at CODE BLUE tomorrow. Check out our Cyber Range Exercise if you’re interested, and feel free to come say hi if you want to chat https://t.co/PMyIoD16O0
Tweet card summary image
codeblue.jp
This is the detailed Contests/Workshops page. page.World leading security researchers will come together for this unique international talks in Tokyo November 18th to 19th 2025
0
2
25
@michael__ni
Michael Niedermayer
1 month
I am the main developer fixing security issues in FFmpeg. I have fixed over 2700 google oss fuzz issues. I have fixed most of the BIGSLEEP issues. And i disagree with the comments @ffmpeg (Kieran) has made about google. From all companies, google has been the most helpfull & nice
94
209
4K
@ProjectZeroBugs
Project Zero Bugs
1 month
Windows: Administrator Protection Kerberos Certificate Authentication EoP
0
9
31
@ProjectZeroBugs
Project Zero Bugs
1 month
Windows: Administrator Protection DOS Devices EoP
0
5
19
@natashenka
Natalie Silvanovich
2 months
@__sethJenkins broke kASLR by doing … nothing 😩 https://t.co/hxPzVTC1RN
1
26
103
@d4m0n_8
D4m0n
2 months
It’s time to publish the blog post about the bug that won at P2O Berlin 2025. Enjoy! With this post, I mark my last moment as a researcher at @oobs_io. I’m moving on to a new place for a fresh start.🔥🦎 https://t.co/PAdwKgeHuL
oobs.io
A deep-dive technical analysis of CVE-2025-50168, a Windows kernel vulnerability (Type Confusion in DirectComposition) presented at Pwn2Own Berlin 2025. This post details how a 4-byte OOB write is...
1
62
189
@FFmpeg
FFmpeg
2 months
CVE slop
@FFmpeg
FFmpeg
2 months
Here's an example of Google's AI reporting security vulnerabilities in this codec: https://t.co/CvGemnoUk9 We take security very seriously but at the same time is it really fair that trillion dollar corporations run AI to find security issues on people's hobby code? Then expect
13
21
457