bcoles Profile
bcoles

@_bcoles

Followers
726
Following
45
Media
27
Statuses
199

` rm -rf /* `
Joined January 2011
Don't wanna be here? Send us removal request.
@_bcoles
bcoles
6 years
Open source projects are usually welcoming of pull requests. Don't let your dreams be dreams.
2
8
40
@cor_ctf
Crusaders of Rust
2 months
Here is our 0day for kernelCTF🩸 - 82k bounty - quickest submission ever - all instances pwned😎 https://t.co/0sb11m8ITD Disclaimer: We apologize for abusing the red black tree family. Turning grandparents against grandchildren is only acceptable in the context of pwn😤
Tweet card summary image
syst3mfailure.io
CVE-2025-38001 is a Use-After-Free vulnerability in the Linux network packet scheduler, specifically in the HFSC queuing discipline. When the HFSC qdisc is utilized with NETEM and NETEM packet...
@cor_ctf
Crusaders of Rust
3 months
Exploit write-ups for our 🚨latest 0-day🚨and the tragedy that swept the red black tree family dropping soon 👀 Here is a tiktok style video for those of you with no attention span thanks to slop and social media. Turn on the audio!!!
0
76
309
@MehdiHacks
Mehdi
4 months
An introduction to Software Defined Radios. A thread for beginners on: 1. What a SDR is 2. What you can do with SDRs 3. How it plays a role in the security/hacking world 4. How it’s used in ham radio. 5. How to choose/buy one 6. Link to more reading material 0/21
Tweet media one
26
290
2K
@a13xp0p0v
Alexander Popov
4 months
Big new feature in kernel-hardening-checker: now it supports checking the Linux kernel security parameters for RISC-V ⚡️ (in addition to X86_64, ARM64, X86_32, and ARM). I've spent many weekends on this. Thanks to @_bcoles for the contribution ⭐️ https://t.co/QWDLQIO4wi
Tweet card summary image
github.com
A tool for checking the security hardening options of the Linux kernel - a13xp0p0v/kernel-hardening-checker
2
33
129
@alexjplaskett
Alex Plaskett
8 months
Too Subtle to Notice: Investigating Executable Stack Issues in Linux Systems https://t.co/hVNRltXmVs
Tweet media one
0
6
23
@linkersec
Linux Kernel Security
8 months
KernelSnitch: Side-Channel Attacks on Kernel Data Structures Paper by Lukas Maar et al. about using a timing side-channel for leaking addresses of exploitation-relevant kernel structures. https://t.co/G30BwPJxYy
Tweet media one
Tweet media two
1
74
286
@rnmx123
Jan Kopecky
10 months
@nyxgeek On related note, did you know, that 7z (running as admin), can browse to "PhysicalDrive0" (so \\.\PhysicalDrive0\3.Basic data partition.ntfs\Windows\System32\config\) and copy file from there? SAM is not locked, AV/EDR don't seem to give a damn :)
Tweet media one
6
76
294
@ptswarm
PT SWARM
9 months
🆕 Check out our latest publication on DMA attacks via SD cards! 💾 The article was written by our researcher Gesser. ➡️ https://t.co/I4ujGaggJ2
Tweet media one
3
39
77
@klecko0
Klecko
11 months
I've written a post on SELinux and some public bypasses for Android kernel exploitation. It's especially relevant for Samsung and Huawei devices due to their use of hypervisors. Check it out here:
klecko.github.io
This post aims at giving an overview of what SELinux is, how it is implemented, and how to bypass it, from the point of view of Android kernel exploitation.
10
131
417
@jduck
Joshua J. Drake
1 year
Also, to temper some concern about @evilsocket recent research... His bugs are in a thing that none of you should have installed so when it's published, please just uninstall that junk. Hopefully the response of the developer shows how badly you need to remove it.
5
26
187
@notselwyn
Lau
1 year
Exciting news! 🚀 Just dropped my blogpost unveiling the universal Linux kernel LPE PoC for CVE-2024-1086 (working on v5.14 - v6.7) used for pwning Debian, Ubuntu, and KernelCTF Mitigation instances, including novel techniques like Dirty Pagedirectory 🧵 https://t.co/zFimVzjgYB
Tweet card summary image
pwning.tech
A tale about exploiting KernelCTF Mitigation, Debian, and Ubuntu instances with a double-free in nf_tables in the Linux kernel, using novel techniques like Dirty Pagedirectory. All without even...
12
272
786
@_bcoles
bcoles
2 years
Nice #KASLR break by @p1k4l4 for x86_64 kernels with Xen support (Debian and Ubuntu by default). Xen symbols are included in the kernel ELF .notes section and exposed world readable via SysFS (/sys/kernel/notes) since 2007 (pre-KASLR). Added to KASLD: https://t.co/bui5JxSxHN
Tweet card summary image
github.com
@p1k4l4
Pikala
2 years
I'm excited to announce that the technical analysis and the exploit of my CVE-2023-6546 (ZDI-24-020) Linux Kernel GSM Multiplexing Race Condition LPE is now available on : https://t.co/bk4yjCMtdl Happy Reading #Cybersecurity #Vulnerability #CVE #InfoSec #exploit #Security
1
7
28
CVE-2023-38408: Remote Code Execution in #OpenSSH's forwarded ssh-agent @qualys does it again!🔥 https://t.co/0sj5e5oGTG
0
26
90
@sam4k1
sam4k
2 years
pretty cool UAF in the handling of stack expansion in kernels 6.1 - 6.4
0
12
47
@dragosr
dragosr
2 years
New timing attack on Intel CPUs, a side channel Meltdown using the EFLAGS register.
1
4
16
@_bcoles
bcoles
3 years
Support for #EntryBleed prefetch #KASLR bypass (CVE-2022-4543) added to KASLD - https://t.co/NDUxBpxtG5 Should work for Intel x86_64 CPUs (with KPTI enabled or disabled) and AMD x86_64 CPUs with KPTI disabled. Uses Will's proof of concept code: https://t.co/covFlIZQzd
Tweet media one
Tweet media two
3
9
13
@ProjectZeroBugs
Project Zero Bugs
3 years
Exploiting CVE-2022-42703 - Bringing back the stack attack
2
38
104
@NCCGroupInfosec
NCC Group Research & Technology
3 years
Blog: SETTLERS OF NETLINK: Exploiting a limited UAF in nf_tables (CVE-2022-32250) against the latest Ubuntu (22.04) and Linux kernel 5.15 - by @saidelike , @alexjplaskett and @FidgetingBits - https://t.co/3XHuzQ5mBj
1
65
150
@NCCGroupInfosec
NCC Group Research & Technology
3 years
CVE-2022-32250 (CVE-2022-1966) - A 6 year old bug in the Linux kernel exploited by @nccgroupinfosec EDG @saidelike @fidgetingbits @alexjplaskett Vuln write-up: https://t.co/x5GNztfBgt Exploit write-up coming soon.
3
83
204
@spiderfoot
SpiderFoot
3 years
SpiderFoot 4.0 is now out! Our biggest release in years: 🧠Correlation engine & define your own rules in YAML ✨37 predefined correlation rules reporting interesting findings 🎯8 new modules for popular security tools https://t.co/FXfWys4WDr #OSINT #infosec #threatintel
Tweet card summary image
intel471.com
Get the intelligence you need to detect, prevent & respond to cyber threats. Read the Intel 471 cyber threat intelligence blog.
1
35
92