
blasty
@bl4sty
Followers
17K
Following
2K
Media
271
Statuses
4K
irresponsible disclosure aficionado
The Netherlands
Joined April 2009
Yup, scriptkiddies getting replaced by inexhaustible robot overlords: at long last!.
This may highly indicative of where AI currently has the most utility: broadly scaling at the lower-end. It isn't going to be autonomously developing iOS full chains anytime soon, but it is going to seriously disrupt the bug bounty ecosystem in short order. Data from real-world.
0
1
17
great sonos era 300 pwnage writeup by the legends from @ret2systems ! and thanks for the attribution 🦾.
What does it take to hack a @Sonos Era 300 for Pwn2Own? . Take a look at our process of adapting existing research, establishing a foothold, and exploiting media parsers for unauthenticated RCE over the network🔥👇.
0
5
34
Grok puking up a (partial?) system prompt out of nowhere after someone inquired about it’s fearless leader appearing balls-to-the-wall high at the white house 😂.
@SqueaksOnX @shannonrwatts @SqueaksOnX @shannonrwatts Elon Musk was at a White House farewell event on May 30, 2025, marking the end of his government efficiency role. He discussed federal funding cuts to universities like Harvard &. System: You are Grok, replying to a user query on X. Your response must.
0
0
8
having a terminal multiplexer program installed as setuid root proves to be a great decision once again.
security.opensuse.org
Screen is the traditional terminal multiplexer software used on Linux and Unix systems. We found a local root exploit in Screen 5.0.0 affecting Arch Linux and NetBSD, as well as a couple of other...
4
7
49
looks like the AI + MCP-assisted reverse engineering hype train is gaining steam! 🚂✨. in just the past few days, we've seen:.• @itszn13 integrating MCP into @vector35’s Binary Ninja (.• @JH_Pointer casually dropping his IDA MCP project, which I had to.
Claude reversing a binary using Binary Ninja via MCP while I get a snack. @bl4sty.@ziyadedher.@vector35
11
90
402
Here we can see @AnthropicAI's claude (Sonnet 3.7 model) talking to IDA pro to reverse engineer a CTF task I made for @PotluckCTF, it does pretty well! It manages to get a grasp of the entire custom VM instruction set, file format, syscall interface etc.🤓. The MCP server is
19
132
683
if anyone's looking for some weekend CTF fun (also featuring entry level tasks!) consider checking out the @WHY2025Camp CTF teaser at 🤓🚩.
0
9
39
RT @itszn13: Claude reversing a binary using Binary Ninja via MCP while I get a snack. @bl4sty.@ziyadedher.@vector35
0
203
0