cdzeno
@cdzeno
Followers
282
Following
4K
Media
1
Statuses
1K
Security Researcher @nozominetworks
Earth
Joined May 2010
Just discovered 10 memory corruption vulnerabilities in the popular Mongoose Web Server (11k stars on GitHub) by fuzzing its embedded TLS stack protocol with @aflplusplus. More technical details here: https://t.co/AzK6USwACO
0
44
222
[Research] Address Sanitizer: Part1 (EN) https://t.co/wm8JJ5TI0I In this research post, I take a closer look at Address Sanitizer (ASan), focusing on how it detects memory errors at runtime. The article covers core concepts such as shadow memory, redzones and how to interpret
hackyboiz.github.io
Hello! I am millet, a new member who recently joined Hackyboiz. While solving wargame challenges in the past, I came across something called ASan. At the time, I only glanced over it briefly, but...
0
25
103
My curated awesome list of cybersecurity research, RE material, exploitation write-ups, and tools. https://t.co/6YgCLKcdUH
#infosec
4
179
1K
For the embedded security enthusiast, here’s a list of resources of vuln researchers inspecting the TP-Link security camera(s): >By @evilsocket : TP-Link Tapo C200: Hardcoded Keys, Buffer Overflows and Privacy in the Era of AI Assisted Reverse Engineering :
evilsocket.net
1
61
355
How was a single heap overflow in an Audible parser enough to compromise an Amazon account? Find out in our latest blog post, in which we break down the Kindle vulnerabilities we reported earlier this year. https://t.co/v524qgdJca
blog.thalium.re
Although Kindle e-readers are a prime target in modding and jailbreaking communities, there is little public work about vulnerability research in remote code execution scenarios. In this post, we...
0
17
53
New RE Video - more iOS Spyware: https://t.co/aEcuAqOh0A An old sample (2019) but still fun to reverse engineer tied to PoisonCarp. I focus on how the embedded implant is extracted, executed, and how the implant sends data to C2. Also use Jonathan Levin's awesome disarm tool :)
1
17
106
In a new video, Nicolò Fornari walks through how to fuzz with AFL++, how to pick targets, avoid common pitfalls, and boost effectiveness. Find performance tips, fuzzing theory, and AFL++ internals. https://t.co/S21LcYIUJZ
#security #fuzzing #AFLplusplus #appsec
0
15
55
"From Zero to QEMU: A journey into system emulation" (slide deck) https://t.co/bYgH3zq83f Credits Antonio Nappa #infosec #qemu
0
100
562
A beautiful, fast, and feature-rich terminal-based Excel and CSV viewer built with Go. #golang
https://t.co/EEK33YnS56
6
48
441
🦀 Building an LLM From Scratch in Rust Want to really understand how LLMs work under the hood? Start at the foundation: a complete GPT-2 style transformer. https://t.co/qpsi9QN6RV
#rust #rustlang
26
204
2K
Tutorial LD_PRELOAD TLS cert bypass for embedded security research by @f0rw4rd_at
https://t.co/Nr4YgZZFBL
#infosec
1
29
157
Will you be able to exploit a 13-year-old vulnerability on QEMU'S TCG and become root? https://t.co/xE21e2T9ZH Hit us up in dm if you make progress!
0
4
14
Direct kernel object manipulation (DKOM) attacks on ETW providers. TL;DR: This blog post analyze how attackers, with elevated privileges, can use their access to stage Windows Kernel post-exploitation capabilities. IBM Post: https://t.co/i9X2NfWYjp
1
35
195
VR things I wish I knew about sooner! https://t.co/FICTguRTGy
github.com
A plugin to introduce interactive symbols into your debugger from your decompiler - mahaloz/decomp2dbg
1
13
58
Just released🎉 Remote GUI debugger for Reverse Engineering. https://t.co/rqRo28k253
github.com
Next-Generation Remote Analysis Suite for Reverse Engineering. - DoranekoSystems/DynaDbg
5
62
492
My pet project kernel-build-containers now supports the Podman container engine in addition to Docker📦 You can use this project to build the Linux kernel with many different compilers. It's a nice solution for the toolchain hell🔥 problem. Enjoy! https://t.co/pYJLtr9Gmx
github.com
Containers for building the Linux kernel or other software with many different compilers - a13xp0p0v/kernel-build-containers
0
8
37
We’re open-sourcing pwno-backend - our previous production backend architecture, that covers up from uploading a binary to k8s ingress that went through a literation of six months, as Pwno heading to new direction. https://t.co/W0TTiWVX7e
3
9
61
Hello hackers! We're running a study about fuzz harnessing on https://t.co/yjFhiLYJXt! Go learn a bit about fuzzing and get a gift card at the same time :-) This is the first of hopefully some more material around the topic in the next few months, so stay tuned for that as well!
https://t.co/SbWKaqhK2a has just added a dojo focused on creating fuzz harnesses for OSS-Fuzz, https://t.co/MSMiCKxgwA $50 Amazon gift card for the first 30 participants who complete it, only 14 so far as of today.
0
20
183