
Winter
@byronchris25
Followers
1K
Following
449
Media
48
Statuses
348
CTF🚩 | Networking 🌐 | Python 💻 | Kernel 🐧| CyberSec Instructor | Captain: @Seek3r5 | Opensource Lead @0xHueristiq | Security Analyst @yelbridges
kisumu, kenya
Joined December 2015
RT @0x_shaq: okay now that it's burned, dropping it:.CVE-2025-25257: a Pre-Auth RCE in Fortinet's WAF product called FortiWeb. https://t.c….
github.com
FortiWeb CVE-2025-25257 exploit. Contribute to 0xbigshaq/CVE-2025-25257 development by creating an account on GitHub.
0
78
0
RT @harshleenchawl2: Vulnerability Research Repositories & Content👾. 📌Awesome Vulnerability Research by sergey-pronin..
github.com
🦄 A curated list of the awesome resources about the Vulnerability Research - sergey-pronin/Awesome-Vulnerability-Research
0
85
0
RT @SEKTOR7net: Credentials access via Shadow Snapshots, WMI and SMB, all done remotely. Technique implemented inside impacket framework a….
0
84
0
RT @ShitSecure: After today’s talk at #TROOPERS25 I’m releasing BitlockMove, a PoC to execute code on remote systems in the context of a lo….
github.com
Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking - rtecCyberSec/BitlockMove
0
173
0
RT @OutflankNL: Here's our new blog on hiding your implant in VTL1, where even an EDR's kernel sensor can't see it.🧑🦯. Post includes full….
outflank.nl
Dig into secure enclave internals and learn about practical techniques used to exploit a read-write primitive in a vulnerable enclave DLL.
0
82
0
RT @OpenSecTraining: The "Fuzzing 1001: Introductory white-box fuzzing with AFL++" class by Francesco Pollicino has been finalized, and wil….
0
17
0
RT @InterruptLabs: 📣 Exciting news for aspiring vulnerability researchers - a selection of our internal VR Development Program training res….
github.com
This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Program. - GitHub - interruptlabs/VRDP-Training-Material: This...
0
45
0
RT @linkersec: Solo: A Pixel 6 Pro Story (When one bug is all you need). Awesome article by Lin Ze Wei about adapting the Pixel 7/8 exploit….
0
26
0
RT @RuiCarrilho5: Here's Reverse Engineering for Everyone! This wonderful little online book teaches you how to reverse engineer, and in th….
0
230
0
RT @netsecurity1: 🚨 Interested in Windows kernel exploitation?.Our @sstic 2025 talk on the Shadow Stack implementation in the Windows kerne….
0
62
0
RT @0xilis: Finally put out a tutorial for creating certificates to sign shortcuts instead of having Apple do it.….
github.com
Shortcut that I signed using my own private key! Contribute to 0xilis/SelfSignedShortcutDemo development by creating an account on GitHub.
0
7
0
RT @speedyfriend433: Fun fact : iOS 15 could open settings app by Preference URL Scheme within Contacts app using profile website link! htt….
0
10
0
RT @guhe120: CVE-2025-33070 is an auth bypass in the function NetrServerAuthenticate3 - which is the same function of ZeroLogon. But you ne….
0
7
0
RT @minacrissDev_: A step-by-step guide to writing an iOS kernel exploit.
alfiecg.uk
Introduction Memory management in XNU Page tables Physical use-after-free Exploitation strategy Heap spray Kernel memory read/write Conclusion Bonus: arm64e, PPL and SPTM
0
47
0