Ali
@aahmad097
Followers
104
Following
583
Media
13
Statuses
97
I occasionally lift computers and hack weights @ht3labs gang Tweets are mi own.
Joined October 2024
Ali Ahmad @aahmad097 takes us into the internals of Windows file system mini-filters, focusing on cldflt.sys—driver behind Windows cloud synch. Get a practical look at how cloud sync ops expose potential attack surfaces in the kernel. #RVA #Cyber #Training
meetup.com
This session with [Ali Ahmad](https://www.linkedin.com/in/aahmad097/) takes us deep into the internals of Windows file system mini-filters, focusing on cldflt.sys—the drive
0
1
1
We're officially announcing our speakers DistrictCon Year 1! Check out our incredible lineup:
districtcon.org
1
14
41
uh........huh.
0
0
2
[ZDI-25-622|CVE-2025-25268] (Pwn2Own) Phoenix Contact CHARX SEC-3150 Configuration Service Missing Authentication Vulnerability (CVSS 8.8; Credit: HT3 Labs (@ht3labs))
zerodayinitiative.com
(Pwn2Own) Phoenix Contact CHARX SEC-3150 Configuration Service Missing Authentication Vulnerability
1
3
8
[ZDI-25-621|CVE-2025-25269] (Pwn2Own) Phoenix Contact CHARX SEC-3150 DHCP Configuration Command Injection Remote Code Execution Vulnerability (CVSS 8.8; Credit: HT3 Labs (@ht3labs))
zerodayinitiative.com
(Pwn2Own) Phoenix Contact CHARX SEC-3150 DHCP Configuration Command Injection Remote Code Execution Vulnerability
1
3
4
Check out this blog post about the Windows Brokering File System :) Hope you all enjoy!
New blog post is out! We did some Windows reverse engineering here. Enjoy! https://t.co/CvJy2NwCoA
0
2
14
Less than 2 weeks until "Advanced .NET Exploitation" at @reconmtl, as usual, we'll be exploiting 15+ RCEs and and 5 LPEs across multiple enterprise targets, lets chain some bugs! https://t.co/biDIcQi7CT
summoning.team
Summoning Team
0
7
47
Writeups are literally just hastily written markdown files converted to HTML, so typos and weird grammar might exist. Most importantly, they have full exploit code.
0
2
6
Our blog is live! Here is our Phoenix Contact exploit from Pwn2Own Automotive 2025 https://t.co/VUBFmDw0s0
0
6
47
Our blog is live! Here's our QNAP exploit from Pwn2Own Ireland https://t.co/fRtlpaicql
1
31
104
Our blog is live! Here's our BeeStation exploit from Pwn2Own Ireland https://t.co/auHYJ2WFun
0
18
53
Sup, I'm the guy that hacked the Samsung S24 during Pwn2Own Ireland 2024 I just released a non-beginner Android application security course on Udemy. The course is released under my company, Malicious Erection LLC Check it out here!
udemy.com
Udemy is an online learning and teaching marketplace with over 250,000 courses and 80 million students. Learn programming, marketing, data science and more.
19
111
743