algillera Profile Banner
Alberto Gª Illera Profile
Alberto Gª Illera

@algillera

Followers
2K
Following
3K
Media
25
Statuses
1K

Red Teaming & Friends

San Francisco
Joined December 2010
Don't wanna be here? Send us removal request.
@algillera
Alberto Gª Illera
5 years
@francisco_oca and I have just released Ponce v0.3 version. Runs on any IDA version >=7.0 on Windows, Linux and OSx. Symbolic Execution within IDA just one click away. Ponce now supports ARM binaries and a large list of new features that you can find here:.
Tweet card summary image
github.com
Previous release was incorrectly using an old commit
1
12
16
@algillera
Alberto Gª Illera
2 days
RT @degrigis: You are probably gonna hate me for the title of this blogpost, but, here is a quick peek into one of the most surprising comp….
0
28
0
@algillera
Alberto Gª Illera
2 days
RT @cl4sm: Checkout the Post-Mortem of our system ARTIPHISHELL (by @degrigis and I)! We look at a few issues that kept @shellphish from a t….
0
18
0
@algillera
Alberto Gª Illera
15 days
The second post in my AIxCC series is out. This one breaks down the rules and scoring—key to understanding why teams built their systems the way they did. It also analyzes teams results and why some of them found less vulns but were scored higher!
0
8
25
@algillera
Alberto Gª Illera
16 days
RT @wunderwuzzi23: 👉 Episode 21: Hijacking Windsurf. How Prompt Injection Leaks Developer Secrets. The agent cannot protect your private co….
0
39
0
@algillera
Alberto Gª Illera
20 days
Back at Defcon after years away. The highlight? DARPA’s AI Cyber Challenge (AIxCC). It blew me away—and inspired me to launch a new personal blog. I'm doing a series of posts about AIxCC. The first one is out:
1
18
106
@algillera
Alberto Gª Illera
25 days
RT @0xor0ne: Cisco RV130 VPN router firmware analysis and vulnerability research by Raffaele Ruggeri. #infosec #io….
0
57
0
@algillera
Alberto Gª Illera
27 days
RT @pr0cf51: Here’s the source code of our #AIxCC winning team @TeamAtlanta24, enjoy! . More things TBA.
Tweet card summary image
github.com
Contribute to Team-Atlanta/aixcc-afc-atlantis development by creating an account on GitHub.
0
37
0
@algillera
Alberto Gª Illera
29 days
RT @mbrg0: we hijacked microsoft's copilot studio agents and got them to spill out their private knowledge, reveal their tools and let us u….
0
905
0
@algillera
Alberto Gª Illera
1 month
Is there any playlist with the songs played between talks at @BlackHatEvents. They are soooo cool!.
0
0
0
@algillera
Alberto Gª Illera
1 month
Really cool talk at Blackhat to train models on a specific task, in this case malware development bypassing AVS. Single purpose model are way better than general ones. Model was released:.
Tweet card summary image
outflank.nl
Training specialized LLMs with reinforcement learning with verifiable rewards (RLVR), using evasive malware development as a case study.
0
0
2
@algillera
Alberto Gª Illera
1 month
RT @RincnCuriosoo: Convirtiendo un cuadrado en un triángulo equilátero .
0
2K
0
@algillera
Alberto Gª Illera
2 months
RT @JeremiahDJohns: One of my all-time favorite type of videos is pre-fame bands playing their extremely famous songs to a tiny room of peo….
0
14K
0
@algillera
Alberto Gª Illera
3 months
RT @retr0reg: exploiting a v8 engine pwn challenge
0
73
0
@algillera
Alberto Gª Illera
4 months
RT @HashemGhaili: Prompt Theory (Made with Veo 3). What if AI-generated characters refused to believe they were AI-generated? https://t.co/….
0
4K
0
@algillera
Alberto Gª Illera
4 months
RT @robertswiecki: Fuzzing Windows Defender in the Honggfuzz+IntelPT (hardware) mode. by @buherator.
0
62
0
@algillera
Alberto Gª Illera
4 months
RT @dillon_franke: Thrilled to announce my new Project Zero blog post is LIVE! 🎉 I detail my knowledge-driven fuzzing process to find sandb….
0
105
0
@algillera
Alberto Gª Illera
4 months
RT @vitrupo: Jim Fan says NVIDIA trained humanoid robots to walk and move like humans -- zero-shot transfer from simulation to the real wor….
0
684
0
@algillera
Alberto Gª Illera
5 months
RT @nicksdjohnson: Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vu….
0
6K
0
@algillera
Alberto Gª Illera
5 months
RT @luijait_: Cybersecurity AI (CAI) - HackableII - 9 minutos y 45 segundos . 🔍 1/7 Fase Inicial: Reconocimiento del objetivo 192.168.2.11E….
0
6
0