c0m0r1 Profile Banner
c0m0r1 Profile
c0m0r1

@c0m0r1

Followers
2K
Following
5K
Media
1K
Statuses
6K

Currently @ @ENKI_official_X / KAIST CS & EE 18 + EE M.S. 23 @ KAIST Hacking Lab. / KAIST GoN 18 / pwn, rev ❤️ / newbie forever / 음악듣는 코모리 @DC0m0r1

Joined April 2019
Don't wanna be here? Send us removal request.
@c0m0r1
c0m0r1
5 years
심심해서 만든 메인트
1
0
6
@megabeets_
Itay Cohen 🌱
10 days
🚨BREAKING: We uncovered LANDFALL — a commercial-grade Android spyware exploiting a now-patched Samsung zero-day (CVE-2025-21042) through weaponized DNG images sent via WhatsApp, enabling zero-click compromise of Samsung Galaxy devices. 1/ https://t.co/hfTFP1MMX2
Tweet card summary image
unit42.paloaltonetworks.com
Commercial-grade LANDFALL spyware exploits CVE-2025-21042 in Samsung Android’s image processing library. The spyware was embedded in malicious DNG files.
3
63
149
@ProjectZeroBugs
Project Zero Bugs
10 days
Samsung: QuramDng MapPolynomial Opcode out-of-bounds write
0
10
46
@ProjectZeroBugs
Project Zero Bugs
13 days
Defeating KASLR by Doing Nothing at All
0
37
159
@POC_Crew
POC_Crew
24 days
[POC2025] SPEAKER UPDATE 👤 Woosun Song(@pr0cf51) - "ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System" #POC2025
0
1
18
@c0m0r1
c0m0r1
1 month
Presentations for CROSS-X are finally over! More updates — including the paper, code, and blog posts — are coming soon. Stay tuned! 😁
0
1
30
@c0m0r1
c0m0r1
1 month
Will start soon :)
@c0m0r1
c0m0r1
1 month
“CROSS-X: Generalized and Stable Cross-Cache Attack on the Linux Kernel”, extended from my master’s thesis, has been accepted to ACM CCS 🎉 It explores how to make cross-cache attacks more stable and systematic. You can catch the talk on Oct. 14, 11:00–12:00 (Room 102, Track A5)
1
0
48
@c0m0r1
c0m0r1
1 month
Grateful to our co-first author Juhyun Song, who will present the paper at ACM CCS, to my advisor Prof. Insu Yun (@insu_yun) for invaluable guidance, and to ENKI Whitehat (@ENKI_official_X) for supporting this research. See you at ACM CCS (@acm_ccs)!
0
0
5
@c0m0r1
c0m0r1
1 month
“CROSS-X: Generalized and Stable Cross-Cache Attack on the Linux Kernel”, extended from my master’s thesis, has been accepted to ACM CCS 🎉 It explores how to make cross-cache attacks more stable and systematic. You can catch the talk on Oct. 14, 11:00–12:00 (Room 102, Track A5)
1
7
99
@linkersec
Linux Kernel Security
2 months
Dirty Pageflags: Revisiting PTE Exploitation in Linux Article by @ptrYudai on the exploitation technique of overwriting the R/W flag in a PTE entry to allow writing into read-only files. https://t.co/tX1r2zuUuG
0
43
266
@TeamAtlanta24
Team Atlanta
3 months
Team Atlanta wins the AIxCC Grand Final! 🏆
5
28
113
@c0m0r1
c0m0r1
3 months
I'll be in villages Find negi hats to say hi 👋👋👋
0
0
28
@c0m0r1
c0m0r1
3 months
Howdy :)
0
0
23
@33y0re
Connor McGarr
4 months
Very awesome!! It looks like code to support SMAP is beginning to appear the latest Canary build!
4
19
132
@ENKI_official_X
ENKI WhiteHat
4 months
Curious how the Codegate 2025 FullChain was meant to be pwned? From RCE to SBX to LPE... the path to SYSTEM is now public. Official write-up is live! #pwn #CTF #Codegate #RCE #SBX #LPE https://t.co/9p7wUFCjnI
0
38
91
@MacroWorld21
A. I. (Macro Photography)🔬
8 months
RF magic translated to schematic. Now you know.. Find the inductors 😛
11
66
729
@golbin
골빈해커
8 months
📰 대학생이 40년만에 해시테이블의 성능 향상을 이뤄냈다고 해시테이블 알고리즘은 워낙 오래된 연구라서 아무도 그 이상 최적화하기 어렵다고 생각했는데, Andrew Krapivin이라는 학부생이 그 틀을 깨고 알고리즘을 발명했다는 것이 재미난 포인트입니다. 역시 아직 미해결 문제는 많고,
1
128
331
@0xor0ne
0xor0ne
8 months
Security analysis of Arm Cortex-M Systems (Usenix paper) https://t.co/EcNpqW0Z4c #infosec #arm
0
15
88
@andreyknvl
Andrey Konovalov
9 months
Looks like we have a confirmation that Cellebrite uses memory corruptions in Linux kernel USB drivers to unlock Android phones. First 2 bugs seem easily discoverable by syzkaller/syzbot with a bit of extra descriptions. 3rd one is likely as well ⤵️
@GrapheneOS
GrapheneOS
9 months
https://t.co/qQXICm5e31 Amnesty International’s Security Lab has a post about 3 vulnerabilities exploited by Cellebrite to extract data from locked Android devices. GrapheneOS blocked exploiting these vulnerabilities in multiple different ways. We also patched them much earlier.
6
84
424
@c0m0r1
c0m0r1
9 months
Actually I solved this by adding a simple state machine in my ISR to ignore noisy interrupts. Still don't know why esp32 keeps firing interrupts on non-changed pins though 🤔
@c0m0r1
c0m0r1
9 months
I'm currently working on ESP32 and seems GPIO interrupts are super noisy. I tried both software (1~1000ms) and hardware (1nf~10uF) debouncing, and ISR optimization (done within 100us). However the pin still gives "false rising edge" when I release switches. Any helps or ideas?
0
0
7