andersonc0d3 Profile Banner
Anderson Nascimento Profile
Anderson Nascimento

@andersonc0d3

Followers
3K
Following
40K
Media
221
Statuses
9K

Founder & Security Researcher @alleleintel Mastodon: @[email protected] Bluesky: @andersonc0d3.bsky.social

Salvador, Brazil
Joined December 2009
Don't wanna be here? Send us removal request.
@andersonc0d3
Anderson Nascimento
18 days
Estaremos ministrando treinamentos de exploração de vulnerabilidades de binário e kernel em ambientes Linux em 2026. Este treinamento de binário está sendo ofertado ao público geral pela primeira vez. Para ambos treinamentos, aumentamos a carga horária (de 40 para 48 horas) e na
@alleleintel
Allele Security Intelligence
19 days
Lançamento de Novas Turmas 2026: Linux Exploitation Temos o prazer de anunciar as novas turmas dos nossos treinamentos especializados em Linux Binary Exploitation e Linux Kernel Exploitation para Maio e Agosto de 2026. Abrimos, pela primeira vez, o treinamento de Linux Binary
0
1
8
@andersonc0d3
Anderson Nascimento
4 hours
MigGPT: Harnessing Large Language Models for Automated Migration of Out-of-Tree Linux Kernel Patches Across Versions https://t.co/IOK8IHPniX
0
0
0
@alexjplaskett
Alex Plaskett
2 days
PlayStation 3 Architecture - A practical analysis by Rodrigo Copetti https://t.co/yYYZ8ZBX4O
1
10
59
@rrcyrus
Richie Cyrus
1 day
This is an opportunity to join a great team with far-reaching impact across Apple! If you’ve been interested in or are currently writing detection as code at scale, please take a look.
Tweet card summary image
jobs.apple.com
Apply for a Detection Engineer job at Apple. Read about the role and find out if it’s right for you.
4
20
73
@andersonc0d3
Anderson Nascimento
21 hours
Solving the NYTimes Pips puzzle with a constraint solver https://t.co/aQ3MOKKhOC
0
0
0
@Binary_Gecko
Binary Gecko
2 days
🦎 Gecko Academy is launching in Argentina! This free one-year program in offensive cybersecurity invites you to learn from field experts💡, gain practical skills and start your path as a vulnerability researcher🔎. Limited spots available. Submit your challenge by November
0
7
24
@dillon_franke
Dillon Franke
3 days
Here are the slides for my talk yesterday at Objective By the Sea! Tons of incredible research and researchers here in Ibiza :) https://t.co/nZ8GLZ5ZHS
1
17
55
@andersonc0d3
Anderson Nascimento
2 days
We (@alleleintel) will offer a training in English next year for the first time. The training will be an online introduction to Linux Kernel Exploitation. If you would like to know more, my DMs are open.
0
3
4
@andersonc0d3
Anderson Nascimento
2 days
I do that in my trainings. I even include the mistakes my team made while creating the trainings in the program.
@0xWasp_
Junior Mateus
3 days
During his talk, @i41nbeer said something that got me thinking: “When you see research like this, you think it was a linear process—from A to B to C… but that’s not how it really is.” I thought it would be great if there was a vulnerability research course based on a real case
1
0
5
@0xWasp_
Junior Mateus
3 days
During his talk, @i41nbeer said something that got me thinking: “When you see research like this, you think it was a linear process—from A to B to C… but that’s not how it really is.” I thought it would be great if there was a vulnerability research course based on a real case
1
8
51
@docmilanfar
Peyman Milanfar
4 days
You should be so lucky to have people throughout your research career that you can openly bounce ideas to and from - especially if they complement your strengths in your areas of weakness - it is a rare and precious gift.
28
273
2K
@gregmushen
Greg Mushen
4 days
“We can say with confidence that it either improved it…or didn’t improve it.” - Journal of Ambiguous Findings, Vol. 1
1
1
50
@hexacon_fr
Hexacon
4 days
We've just released the challenges used during Hexacon 2025 Speedrun! Check them out and train for next year 🏆 https://t.co/IV8qP6syFr
Tweet card summary image
github.com
Contribute to hexacon-fr/speedrun-2025 development by creating an account on GitHub.
0
10
59
@offensive_con
offensivecon
4 days
🚨 Save the Date for #offensivecon26 Mark your calendars, spread the word, and stay tuned for when registrations open! 📍 Hilton Berlin 🧠 Trainings: 11–14 May 2026 🎤 Conference: 15–16 May 2026 Visit 🔗 https://t.co/83MHwjF4lo for more details.
0
28
84
@theevilbit
Csaba Fitzl
5 days
The slidedeck to our talk, Crash One: A Starbucks Story - CVE-2025-24277, with @gergely_kalman from @hexacon_fr and @objective_see #OBTS is available from the link below. It was a macOS vulnerability impacting the crash reporting process where we could achieve LPE and sandbox
1
26
84
@iBSparkes
sparkey
5 days
Our newest @dfsec_com blog post is live, thanks to @tomitokics from @df_forensics for putting this together :-) https://t.co/JoJfTOOXzV
blog.dfsec.com
Dataflow Security blog
0
33
140
@quarkslab
quarkslab
5 days
From kernel oops to kernel exploit: How two little bugs (CVE-2025-23330, CVE-2025-23280) in #NVIDIA open GPU #Linux driver can lead to full system compromise. Full technical breakdown inside, #vmalloc exploitation technique included! https://t.co/lVx97yzxyU
1
74
246
@matteyeux
matteyeux
6 days
Awesome paper about latest iOS security mitigations : SPTM, TXM, and Exclaves https://t.co/EXcHTigw3M
2
75
262