cdzeno Profile Banner
cdzeno Profile
cdzeno

@cdzeno

Followers
282
Following
4K
Media
1
Statuses
1K

Security Researcher @nozominetworks

Earth
Joined May 2010
Don't wanna be here? Send us removal request.
@cdzeno
cdzeno
1 year
Just discovered 10 memory corruption vulnerabilities in the popular Mongoose Web Server (11k stars on GitHub) by fuzzing its embedded TLS stack protocol with @aflplusplus. More technical details here: https://t.co/AzK6USwACO
0
44
222
@hackyboiz
hackyboiz
2 days
[Research] Address Sanitizer: Part1 (EN) https://t.co/wm8JJ5TI0I In this research post, I take a closer look at Address Sanitizer (ASan), focusing on how it detects memory errors at runtime. The article covers core concepts such as shadow memory, redzones and how to interpret
Tweet card summary image
hackyboiz.github.io
Hello! I am millet, a new member who recently joined Hackyboiz. While solving wargame challenges in the past, I came across something called ASan. At the time, I only glanced over it briefly, but...
0
25
103
@0xor0ne
0xor0ne
6 days
My curated awesome list of cybersecurity research, RE material, exploitation write-ups, and tools. https://t.co/6YgCLKcdUH #infosec
4
179
1K
@0x_shaq
faulty *ptrrr
6 days
For the embedded security enthusiast, here’s a list of resources of vuln researchers inspecting the TP-Link security camera(s): >By @evilsocket : TP-Link Tapo C200: Hardcoded Keys, Buffer Overflows and Privacy in the Era of AI Assisted Reverse Engineering :
evilsocket.net
1
61
355
@evilsocket
Simone Margaritelli
7 days
It's live
evilsocket.net
1
17
73
@thalium_team
Thalium Team
10 days
How was a single heap overflow in an Audible parser enough to compromise an Amazon account? Find out in our latest blog post, in which we break down the Kindle vulnerabilities we reported earlier this year. https://t.co/v524qgdJca
Tweet card summary image
blog.thalium.re
Although Kindle e-readers are a prime target in modding and jailbreaking communities, there is little public work about vulnerability research in remote code execution scenarios. In this post, we...
0
17
53
@L0Psec
L0Psec
11 days
New RE Video - more iOS Spyware: https://t.co/aEcuAqOh0A An old sample (2019) but still fun to reverse engineer tied to PoisonCarp. I focus on how the embedded implant is extracted, executed, and how the implant sends data to C2. Also use Jonathan Levin's awesome disarm tool :)
1
17
106
@compasssecurity
Compass Security
11 days
In a new video, Nicolò Fornari walks through how to fuzz with AFL++, how to pick targets, avoid common pitfalls, and boost effectiveness. Find performance tips, fuzzing theory, and AFL++ internals. https://t.co/S21LcYIUJZ #security #fuzzing #AFLplusplus #appsec
0
15
55
@0xor0ne
0xor0ne
11 days
"From Zero to QEMU: A journey into system emulation" (slide deck) https://t.co/bYgH3zq83f Credits Antonio Nappa #infosec #qemu
0
100
562
@golangch
Golang News & Libs & Jobs - human 🗣️ , no 🤖
14 days
A beautiful, fast, and feature-rich terminal-based Excel and CSV viewer built with Go. #golang https://t.co/EEK33YnS56
6
48
441
@brk0v
Viacheslav Biriukov
15 days
🦀 Building an LLM From Scratch in Rust Want to really understand how LLMs work under the hood? Start at the foundation: a complete GPT-2 style transformer. https://t.co/qpsi9QN6RV #rust #rustlang
26
204
2K
@0xor0ne
0xor0ne
16 days
Tutorial LD_PRELOAD TLS cert bypass for embedded security research by @f0rw4rd_at https://t.co/Nr4YgZZFBL #infosec
1
29
157
@___prosti
Gabriel Prostitis
18 days
stop using ubuntu 24.04 to host your kernel pwn challenges lmao https://t.co/uCCNthelDn
5
85
573
@___prosti
Gabriel Prostitis
2 months
Will you be able to exploit a 13-year-old vulnerability on QEMU'S TCG and become root? https://t.co/xE21e2T9ZH Hit us up in dm if you make progress!
0
4
14
@5mukx
Smukx.E
20 days
Direct kernel object manipulation (DKOM) attacks on ETW providers. TL;DR: This blog post analyze how attackers, with elevated privileges, can use their access to stage Windows Kernel post-exploitation capabilities. IBM Post: https://t.co/i9X2NfWYjp
1
35
195
@DoranekoSystems
25 days
Just released🎉 Remote GUI debugger for Reverse Engineering. https://t.co/rqRo28k253
Tweet card summary image
github.com
Next-Generation Remote Analysis Suite for Reverse Engineering. - DoranekoSystems/DynaDbg
@DoranekoSystems
30 days
I will be releasing the Android ARM64 version soon!
5
62
492
@a13xp0p0v
Alexander Popov
26 days
My pet project kernel-build-containers now supports the Podman container engine in addition to Docker📦 You can use this project to build the Linux kernel with many different compilers. It's a nice solution for the toolchain hell🔥 problem. Enjoy! https://t.co/pYJLtr9Gmx
Tweet card summary image
github.com
Containers for building the Linux kernel or other software with many different compilers - a13xp0p0v/kernel-build-containers
0
8
37
@ruikai
Ruikai Peng
1 month
We’re open-sourcing pwno-backend - our previous production backend architecture, that covers up from uploading a binary to k8s ingress that went through a literation of six months, as Pwno heading to new direction. https://t.co/W0TTiWVX7e
3
9
61
Hello hackers! We're running a study about fuzz harnessing on https://t.co/yjFhiLYJXt! Go learn a bit about fuzzing and get a gift card at the same time :-) This is the first of hopefully some more material around the topic in the next few months, so stay tuned for that as well!
@stevedwardw
Dradis
1 month
https://t.co/SbWKaqhK2a has just added a dojo focused on creating fuzz harnesses for OSS-Fuzz, https://t.co/MSMiCKxgwA $50 Amazon gift card for the first 30 participants who complete it, only 14 so far as of today.
0
20
183