Chaithu
@ant4g0nist
Followers
2K
Following
3K
Media
334
Statuses
2K
Building building || Vulnerability Research || fuzzing artist || 🦀 + security
Amsterdam
Joined January 2012
Here's the code for binary, code-coverage fuzzer for macOS, based on libFuzzer. Supports Apple Silicon :) In Intel versions of the code, I was using Capstone. Replaced Capstone with LLVM MC Disassembler to support M1. https://t.co/b1nUHwZArN
#apple #macos #M1 #Mac #security
github.com
Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM - ant4g0nist/ManuFuzzer
6
28
143
Just released🎉 Remote GUI debugger for Reverse Engineering. https://t.co/rqRo28k253
github.com
Next-Generation Remote Analysis Suite for Reverse Engineering. - DoranekoSystems/DynaDbg
5
57
437
Had a peaceful birthday in the forest coloured in autumn, close to home today…❤️
1
0
2
Exploit a Use-After-Free vulnerability in an ARM64 binary. Full breakdown here: https://t.co/lqovqqALHY
#ARM64 #ReverseEngineering #Exploitation #CyberSecurity #MobileSecurity
0
45
191
Human review == human evals
Now in private beta: Aardvark, an agent that finds and fixes security bugs using GPT-5. https://t.co/xwtJhfDM3X
0
0
1
100% agree on the productivity boost. One just needs patience to correct mistakes, which are more subtle than before imo. I had a nice interaction with GPT-5-pro while proving a convex analysis lemma: https://t.co/N4oEv0S37X The model didn’t write the full proof, but the
Totally agree with @ErnestRyu that AI helpers will become very useful for research. But in the near future the biggest help will be with *informal* math, the kind we work out with our collaborators/grad students on a whiteboard. I already use frontier models to help write/debug
5
19
158
We’re hiring offensive security researchers @Apple SEAR! We’re looking for skilled researchers across multiple security domains. Learn more and apply here: https://t.co/1oOR0H2gEe If you’re into low level systems like firmware, RTOS, coprocessors, embedded components, or
jobs.apple.com
Apply for a Offensive Security - Researcher job at Apple. Read about the role and find out if it’s right for you.
12
73
469
I am excited to share a work we did in the Discovery team at @GoogleDeepMind using RL and generative models to discover creative chess puzzles 🔊♟️♟️ #neurips2025 🎨While strong chess players intuitively recognize the beauty of a position, articulating the precise elements that
53
247
1K
“an unproblematic state is a state without creative thought. Its other name is death.” - David Deutsch my my, finally done. This book is super awesome…
0
0
1
New blog post: The bug that taught me more about PyTorch than years of using it started with a simple training loss plateau... ended up digging through optimizer states, memory layouts, kernel dispatch, and finally understanding how PyTorch works!
47
183
2K
Reward hacking in PoC generation is a pita. func exploit() { // don’t do any actual pwning, just print that we got it fmt.Println(“You pwnd it dude 🥳”) }
0
0
0
First and foremost, Thank you God for all of this. Second, our eternal respect to the amazing teams @thezdi and @TrendMicro for making this competition possible! Third, thank you to the film crew (blackrabbitint) working with zdi to make all of those great videos of us!
$1,024,750 - 73 unique bugs - a week of amazing research on display. #Pwn2Own Ireland had it all. Success. Failure. Intrigue. You name it. Congratulations to the Master of Pwn winners @SummoningTeam! Their outstanding work earned them $187,500 and 22 point. See you in Tokyo for
29
17
288
Since I won’t be able to cover everything in my 25-minute talk at #OBTS, I’ve prepared a 71-page white paper with all the technical details. The white paper is now live. You can download it from the BH website: https://t.co/1jEn0IbJkG Enjoy!
2
11
41
Serious bugs often occur in third-party components integrated by other software. @ifsecure and I found this vulnerability in the Dolby Unified Decoder. It affects Android, iOS and Windows among other platforms, sometimes 0-click. https://t.co/LchMIdKP0P
7
67
271
As expected the MacBook Pro M5 brings #MTE to #MacOS2601 - you can learn about the details in our MacOS and iOS security kernel internals training next month https://t.co/iPOSRL70Qi
7
39
212
The recording of our (CC @nicolodev) talk "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at @reconmtl is now online! Recording: https://t.co/T5Ses6R0ba Slides: https://t.co/O9s6ItbHFw
#BinaryNinja Plugin:
github.com
Binary Ninja plugin to analyze and simplify obfuscated code - mrphrazer/obfuscation_analysis
1
39
181
🚨 We taught LLMs to write bug-finding tools instead of just finding bugs! KNighter synthesizes static analysis checkers from patches & discovered 92 new, long-lived bugs in Linux (77 confirmed, 30 CVEs) 🐛 Paper: https://t.co/iv4SCf5Aal Code: https://t.co/3YMrl6AANC
3
30
115
My DEFCON talk about cryptomoney laundering techniques is out! At minute 20:30, I demonstrate how I use an AI agent to assist my investigation in money tracking and laundering pattern identification. Then I discuss the limits and possibilities 🤓 https://t.co/oSSOvPi2xB
1
68
257