πππΎ
@_hg8_
Followers
3K
Following
635
Media
103
Statuses
3K
Security Researcher & Privacy Activist. π DM are welcome for any questions.
/dev/urandom
Joined September 2016
"Webmin 0day remote code execution" Tl;Dr: Lack of input validation in the reset password function allows RCE (CVE-2019-15107). Over 13 0000 vulnerable on Shodan. PoC: /password_reset.cgi user=root&pam&expired&old=wrong | id https://t.co/kYKfq8v6Bb
6
416
804
CVE-2025-23282 is going to debut tomorrow at @hexacon_fr in our talk "CUDA de GrΓ’ce" w/ @chompie1337, but you can try CVE-2025-23332 now! Tweetable Python PoC: ``` import fcntl fcntl.ioctl(open('/dev/nvidiactl'),218,0) ```
NVIDIA has released a security bulletin for NVIDIA GPU Display Drivers. NVIDIA thanks Daniel Rhea, Sam Lovejoy, Valentina Palmiotti, Robin Bastide, JunDong Xie, Giovanni Di Santi, Andrea Di Dio, and Cristiano Giuffrida for reporting their findings. https://t.co/pFIbG28ul3
4
61
268
We're looking for a full stack Go dev in any of the US timezones, if you're interested please DM me. Position is remote with good benefits. A background in security is preferable.
15
1
11
New post: @RelayProtocolβs contracts trusted Ed25519 verification without validating offsets, opening the door to forged allocator signatures and potential double-spends. @_fel1x details the bug, the risks it posed to cross-chain liquidity, and how the issue was addressed.
6
16
110
Meet Aero, a stake pool designed to empower and uplift Solana ecosystem contributors. Here's everything you need to know. π§΅
27
91
219
Threat Contained: marginfi Flash Loan Vulnerability by @_fel1x A new instruction broke the flash loan logic, creating a way to borrow without repaying and putting $160M at risk. We explain the vulnerability, potential impact, and how it was fixed. Full post below β
6
30
154
Verifying myself: I am hg8 on https://t.co/qWEAexQHz8. EKch8vJv9Y1TmJ_7OC6xVP_ASNvHltHQVNu4 /
0
0
0
"The NPM account of the popular developer qix was compromised, leading to malicious versions being published for dozens of packages, including chalk, strip-ansi, and color-convert." Recommended read. Interesting payload. https://t.co/IVR0FpH9MP
#SupplyChain
0
1
2
Here's my research about Python dirty Arbitrary File Write to RCE via overwriting shared object files or overwriting bytecode files. Enjoy! https://t.co/P3V2y0yGH9
#Research #WebAppSec
siunam321.github.io
In Python, if dirty Arbitrary File Write (AFW) vulnerability exists in the application, it is possible to gain RCE via writing shared object files or overwriting bytecode files. It can be very...
0
54
190
"CVE-2025-32463: sudo local privilege escalation via chroot option" An attacker can leverage sudo's -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file. Sudo versions 1.9.14 to 1.9.17 affected. https://t.co/CIlFVA1GF5
#infosec
0
0
0
"TensorFlow Remote Code Execution with Malicious Model" Old technique but good writeup https://t.co/cTVCoaAYhT
#ctf #tensorflow #ai #infosec
splint.gitbook.io
The purpose of this article is to show how to get RCE when a crafted malicious Tensorflow model is loaded. Remember all of this is for educational purposes only! Don't be mean!
0
0
0
"Code injection or backdoor: A new look at Ivantiβs CVE-2021-44529" https://t.co/s2PUVfIdKk
labs.greynoise.io
In 2021, Ivanti patched a vulnerability that they called βcode injectionβ. Rumors say it was a backdoor in an open source project. Letβs find out what actually happened!
0
0
1
"What the I-Soon Leak Tells Us About WiFi Hacking" https://t.co/8I9MDt0Kxk
supernetworks.org
The I Soon Dump
0
1
3
Last year I discovered multiple bugs in virtio-net for VirtualBox (CVE-2023-22098, CVE-2023-22099, CVE-2023-22100) and wrote a 100% reliable VM escape using an out-of-bounds write (with ASLR defeat). Published the exploit code:
9
149
683
"Reverse engineered an ESP32-based smart home device to gain remote control access and integrate it with Home Assistant." Great write-up. Recommended read. https://t.co/li5LoSqYgG
jmswrnr.com
How I reverse engineered an ESP32-based smart home device to gain remote control access and integrate it with Home Assistant.
0
0
0
"CVE-2024-0204: Fortra GoAnywhere MFT Authentication Bypass Deep-Dive" Tl;Dr: "/goanywhere/images/..;/wizard/InitialAccountSetup.xhtml" unauthenticated leads to the setup page, allowing you to create a new admin account. https://t.co/R83RtAkMq2
#cve #poc #exploit
0
1
0
Got an ethical pentest for a kiosk-esque environment, but you're stuck in a browser? Have access to websites, but have a need to go deeper? Look no further! With https://t.co/gSWLVmmkVq you have access to tools that enable lateral enum, calculator://, file browsing, and more!
8
91
439
In December, in macOS Sonoma, Apple fixed 15 video decoding vulnerabilities I reported. This is how these issues were found:
2
44
195
Supply Chain Security: How the Figma security engineering team leveraged commit signatures and Okta Device Trust certificates to protect GitHub release branches. https://t.co/xRVlt7kpwT
#supplychain
figma.com
How the Figma security engineering team protects GitHub release branches.
0
0
1