_wmliang_ Profile Banner
Lucas Leong Profile
Lucas Leong

@_wmliang_

Followers
2K
Following
135
Media
10
Statuses
1K

Play hard, Exploit hard @[email protected]

Taipei
Joined November 2013
Don't wanna be here? Send us removal request.
@5aelo
Samuel Groß
5 days
V8 now has a JS bytecode verifier! IMO a good example for the benefits of a sandbox architecture: - Hard: verify that bytecode is correct (no memory corruption) - Easier: verify that it's secure (no out-of-sandbox memory corruption) Basically separates correctness from security
3
26
112
@never_released
Longhorn
9 days
XNU as shipped to the outside world is built with some flags not available in the compilers apple ships in Xcode: -mapple-speculative-hardening -mllvm -apple-speculative-hardening-mode=always-poison
1
6
67
@tuhaoxin
Haoxin Tu
10 days
Happy to share our work "Cottontail: LLM-Driven Concolic Execution for Structured Test Input Generation" will appear in S&P'26! Paper: https://t.co/vIxZD5BGE2 Code: https://t.co/NxuD4wwNF4 Special thanks to @nim_gnoes_eel, @JNUYUXIAN, @spinpx, @LingxiaoJiang, and @mboehme_ ♥️
6
6
11
@AnthropicAI
Anthropic
13 days
New on our Frontier Red Team blog: We tested whether AIs can exploit blockchain smart contracts. In simulated testing, AI agents found $4.6M in exploits. The research (with @MATSprogram and the Anthropic Fellows program) also developed a new benchmark:
356
722
5K
@itszn13
itszn
13 days
Don't forget to checkout the full writeup with extra details! You can even create your own MD5 collision in browser: https://t.co/JBIPSOecVp
Tweet card summary image
stackchk.fail
A walk through of building an image that displays its own MD5 Hash
1
3
69
@incendiumrockz
incendiumrocks
25 days
My new blog describes a vulnerability in Windows that allows a low privileged user or guest to remotely crash the Spooler service in Windows by one simple call. https://t.co/fiQVib9k6C
Tweet card summary image
incendium.rocks
Showcasing a vulnerability in Windows that causes the Spooler service to crash remotely.
0
21
72
@immortalp0ny
immortalp0ny
26 days
After several attempts I made a segment heap visualizer. It render 2.5kkk chunks of kernel pool for 360ms. It is a handy tool for visual exploits debugging. https://t.co/ETSdltDEJC
0
5
27
@taviso
Tavis Ormandy
26 days
Sometimes it really is a cpu bug 😂 A weird AVX512 bug on Zen 4 (Genoa) just got officially confirmed as erratum 1514 in the latest spec update. There's a workaround/chicken bit too. My testcase: https://t.co/bbpia3vX1U
5
39
263
@michael__ni
Michael Niedermayer
1 month
I am the main developer fixing security issues in FFmpeg. I have fixed over 2700 google oss fuzz issues. I have fixed most of the BIGSLEEP issues. And i disagree with the comments @ffmpeg (Kieran) has made about google. From all companies, google has been the most helpfull & nice
94
210
4K
@__sethJenkins
Seth Jenkins
1 month
We really should be talking about this more....KASLR is just not working properly on Android right now, and it hasn't for a long time. https://t.co/AE0vBXEcob
5
56
193
@d4m0n_8
D4m0n
1 month
It’s time to publish the blog post about the bug that won at P2O Berlin 2025. Enjoy! With this post, I mark my last moment as a researcher at @oobs_io. I’m moving on to a new place for a fresh start.🔥🦎 https://t.co/PAdwKgeHuL
oobs.io
A deep-dive technical analysis of CVE-2025-50168, a Windows kernel vulnerability (Type Confusion in DirectComposition) presented at Pwn2Own Berlin 2025. This post details how a 4-byte OOB write is...
1
61
191
@idkhiddenwtf
idkhidden
1 month
made an IDA plugin that tracks the time you spend in IDA and displays a leaderboard https://t.co/8MACfSevGK https://t.co/NQxBrfQyRE
2
21
123
@lukOlejnik
Lukasz Olejnik
2 months
Remember HackingTeam? They're back as Memento Labs. Their tools were used vs media, universities, government, financial institutions in Russia. Phishing + Chrome 0-day exploit. Just clicking a link was enough for full infection. Quite a disclosure.
0
34
118
@33y0re
Connor McGarr
2 months
Today I am releasing a new blog on Windows on ARM! It comes from the perspective of one, like myself, who comes from an x86 background and is new, but, interested in Windows on ARM! ELs, OS & hypervisor behavior (with VBS), virtual memory, paging, & more! https://t.co/jUHls4wupu
connormcgarr.github.io
Analysis of Windows under ARM64: exception/privilege model, virtual memory mechanics, and OS behavior under VHE
2
77
291
@TeamAtlanta24
Team Atlanta
2 months
A crash feels like being stranded on Mars. No rescue. No signals. Just you… and the logs. Meet Martian — our AI patch agent that fixes the unfixable. Exploring the unknown, one bug at a time. 🔗 https://t.co/eiSWcrRTkZ #AIxCC #AICyberChallenge #LLM #GenAI #AIForSecurity
Tweet card summary image
team-atlanta.github.io
Description of patch agents
0
2
14
@Kevin2600
Kevin2600
2 months
RIP ...
23
163
2K
@thezdi
Trend Zero Day Initiative
2 months
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing: Trend ZDI researcher Simon Zuckerbraun shows how to go from a crash to a full exploit - & he provides you tools to do the same, including his technique used to get ROP execution.
Tweet card summary image
zerodayinitiative.com
In April of 2025, my colleague Mat Powell was hunting for vulnerabilities in Autodesk Revit 2025. While fuzzing RFA files, he found the following crash ( CVE-2025-5037 / ZDI-CAN-26922 , addressed by...
0
30
168
@GoogleDeepMind
Google DeepMind
2 months
Software vulnerabilities can be notoriously time-consuming for developers to find and fix. Today, we’re sharing details about CodeMender: our new AI agent that uses Gemini Deep Think to automatically patch critical software vulnerabilities. 🧵
76
341
2K
@andreyknvl
Andrey Konovalov
3 months
Wrote a trigger for CVE-2025-38494/5 (an integer underflow in the HID subsystem) that leaks 64 KB of OOB memory over USB. Still works on Pixels and Ubuntus (but the bug is fixed in stable kernels). https://t.co/4IvvqcVs4Q
5
80
509