chompie Profile
chompie

@chompie1337

Followers
84K
Following
18K
Media
221
Statuses
5K

hacker, weird machine mechanic, X-Force Offensive Research (XOR)

Joined October 2019
Don't wanna be here? Send us removal request.
@chompie1337
chompie
2 months
kernel hackers go serverless ring0 → cloud 9 ☁️ ?? brb pwning yr gpu nodes ✨
25
123
622
@_dinolover38
dinosaurlover38
7 days
You can also use this same idea to defeat CONFIG_SLAB_VIRTUAL, even if a kernel PTE has been assigned; the memory still has another VMA from the fixed phys/virt relationship We did this in our exploit for CVE-2025-23282 (public soon🤞)
@__sethJenkins
Seth Jenkins
8 days
We really should be talking about this more....KASLR is just not working properly on Android right now, and it hasn't for a long time. https://t.co/AE0vBXEcob
0
3
21
@chompie1337
chompie
7 days
come work with the best advsim team !! ⬇️
@capt_red_beardz
Patrick Fussell
7 days
Any Canadian friends with strong red team backgrounds looking for an AdvSim spot? https://t.co/Ba8V6QcYoP
0
6
25
@natashenka
Natalie Silvanovich
8 days
@__sethJenkins broke kASLR by doing … nothing 😩 https://t.co/hxPzVTC1RN
1
27
102
@Sonic_Rumble
Sonic Rumble
5 days
He’s back ⚡ The Sonic Movie 3 crossover event is live! Defend Shibuya Crossing, unlock Movie Shadow, and discover the new Neon Suit Silver in the Red Star Ring Shop.
32
195
1K
@netspooky
Battle Programmer Yuu
11 days
Chatting about Ouija boards this Halloween and was reminded of the CSS animated ANSI art Ouija board I made for the last episode of @thugcrowd. The font I designed for this was reused for the original @tmpout logo too! I just expanded some glyphs to make them line up better.
2
5
28
@arekfurt
Brian in Pittsburgh
12 days
The sandbox escape vulnerability described by Kaspersky here is quite interesting. Especially in that the technical root cause of the issue bit both Chromium and FireFox developers. Other Windows apps along with OS components might well have similar vulnerabilities.
@blackorbird
blackorbird
15 days
The Hacking Team is back/Operation ForumTroll Phishing link → WebGPU decrypt → Shellcode injection → COM hijack for persistence. Deploys Dante spyware (successor to RCS(Hacking Team), now Memento Labs) + custom LeetAgent for keylogging, file theft. Exploits: Zero-days
4
41
195
@ackmage
hermit
14 days
art is hacking! 💕✨️
@SometimesHelena
♡ Helenasometimes ♡
3 months
Pixel art feels like solving a puzzle especially on a tiny canvas. Every color has to click into just the right spot to get the shape you want ⊹ ₊ ݁.
0
2
19
@vitorviesi
Vitor
4 days
AI agents at enterprise scale ⚡️ Designing the Giga brand. With the brilliant @varunvummadi @eshamanideep @jcarvajalpa
15
15
243
@chompie1337
chompie
16 days
42 days, 13 flights, 9 cities, 5 countries, 3 continents: 3 talks & 1 keynote (in 2 languages), a newspaper article, many inspiring convos. Not bad for a homebody with a fear of flying 😌. Shout out @SinSinology @SudoR00tMe for making me look cool. Now to catch up on sleep!!!
9
2
269
@chompie1337
chompie
16 days
Ending an insane 6 weeks with a celebration. I’m deeply honored to receive the Trailblazer Award from the Society of Women Engineers. Thank you @SWEtalk! Grateful to my mgmt, team, husband, family, and friends. Their support has made every one of my accomplishments possible.
39
27
587
@POC_Crew
POC_Crew
18 days
[POC2025] SPEAKER UPDATE 👤 Christine Fossaceca(@x71n3) - "(Sploit)Lights, Camera, Action! Exploiting Spotlight to Bypass TCC and Leak Data from Apple Intelligence" #POC2025
0
7
36
@juanbrodersen
Juan Brodersen
20 days
Día 1 de @ekoparty: el equipo de X-Force mostró dos zero-day del driver de Nvidia que usan todos los sistemas de IA 🤖 Además: @RogerDingledine abrió con su keynote sobre Tor 🧅 Reportaje, en mi perfil 🔗
0
15
112
@chompie1337
chompie
20 days
en 5 minutos, en vivo!! entrevista en español con yo @_dinolover38
4
11
51
@ekoparty
Ekoparty | Hacking everything
20 days
"Rompiendo la Jaula: Compromiso de la nube IA bajo fuego de GPU NVIDIA" dictada por @_dinolover38 y @chompie1337 | Sala E - Main Track #EKO2025 🔥
0
5
13
@ChargeLabHQ
ChargeLab
8 days
As an EV charging network provider, your reputation lives and dies by reliability. Every failed charging session isn’t just a technical hiccup — it’s a frustrated driver, a potential social post, and a lost opportunity to build trust. That’s why measuring the right reliability
Tweet card summary image
chargelab.co
Learn what metrics you should use to measure the reliability of your EV charging network and how to improve uptime and driver experience effectively.
1
6
18
@SinSinology
SinSinology
21 days
from the bottom of our hearts (McCaulay and Myself) Thank you to the LEGENDS Ryan @the_emmons and @stephenfewer for helping us since our device hard drive got damaged and went into bootloop and to top it off, hard drives were sold out (the chances) ETERNAL RESPECT FROM US🏆❤️‍🔥
@thezdi
Trend Zero Day Initiative
21 days
📢 Confirmed! @SinSinology and @_mccaulay of @SummoningTeam used a pair of bugs to exploit of the Synology ActiveProtect Appliance DP320. That rounds their day off with another $50,000 and 5 more Master of Pwn points. (And clean that screen!) #Pwn2Own
2
7
177
@SinSinology
SinSinology
21 days
i look tense. fuck
@thezdi
Trend Zero Day Initiative
21 days
Whew! He took nearly all 30 minutes to make it happen, but @SinSinology successfully exploited the Synology DS925+. He heads off to the disclosure room to explain what took so long. #Pwn2Own #P2OIreland
11
6
278
@G0ldenGunSec
Dave Cossa
27 days
Ever been on an SCCM site server and *this* close to a DA pw that you couldn't decrypt for some reason? Check out my new blog looking at encryption in use within SCCM sites configured for High Availability and accompanying tooling to recover passwords:
Tweet card summary image
ibm.com
Follow IBM X-Force as they work out the secrets to decrypting credentials vaulted by Microsoft’s System Center Configuration Manager (SCCM).
3
59
139
@POC_Crew
POC_Crew
28 days
[POC2025] SPEAKER UPDATE 👥 Xingyu Jin(@1ce0ear) & Martijn Bogaard - "Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers" #POC2025
0
10
84
@chompie1337
chompie
27 days
pretty sure we got in trouble by the HOA for having it and it eventually led to us moving lmao
1
0
35
@chompie1337
chompie
27 days
Reminds me of a bonding activity I had with my Dad growing up. We had a huge satellite dish in our yard and we’d do “spying” which was just looking for random satellite feeds. I liked when I’d find an on the scene reporter waiting to go live and catch them like picking their nose
@a_greenberg
Andy Greenberg (@agreenberg at the other places)
29 days
Researchers pointed a satellite dish at the sky for 3 years and monitored what unencrypted data it picked up. The results were shocking: They obtained thousands of T-Mobile users' phone calls and texts, military and law enforcement secrets, much more: https://t.co/ZT0nAJch7s🧵👇
6
15
266
@chompie1337
chompie
28 days
bring your eol exploits to @districtcon junkyard! now’s the time to flex yr cute demo
1
19
102
@chompie1337
chompie
28 days
they didn’t want kCTF players to bankrupt them
3
8
165