
DEVCORE
@d3vc0r3
Followers
4K
Following
28
Media
23
Statuses
119
Cyber Red Team in Taiwan
Taiwan
Joined February 2014
Huge thanks to @offsectraining for bringing such intensive and high-level training to Taiwan. 5 days, 3 courses: EXP-401, WEB-300, PEN-300. Proud to see participants push through and even earn the rare OffSec Coin. Looking forward to more in the future! 🔥
0
4
39
Congrats to Orange (@orange_8361) for making @PortSwigger’s Top 10 Web Hacking Techniques again — and to splitline (@_splitline_) for the debut. #1 Confusion Attacks — Apache HTTP Server https://t.co/WPUSs8SHf8
#4 WorstFit — Windows ANSI https://t.co/A3sxYFZKZy
#DEFCON
0
3
37
Thanks @PortSwigger and @BugBountyDEFCON for this awesome event — and also to my @d3vc0r3 buddies for standing on stage to collect the trophy for me! A little follow-up article on this research is coming soon... stay tuned! 🤘
12
32
461
How tough is the @offsectraining #OSEE exam? Orange (@orange_8361) lays out his exam-prep journey, personal reflections, and the key lessons from the EXP-401 (AWE) course. Explore the full story (TC) here: https://t.co/y2cUODtJbZ
0
1
31
#Ubuntu’s new AppArmor-based sandbox aimed to limit untrusted access to user namespaces & io_uring. But it wasn’t foolproof. Pumpkin (@u1f383)’s latest blog shows how he bypassed it—covering the issue, technical details & reporting process. https://t.co/XoMa3KpnRR
#Linux
0
2
21
@offsectraining Correction: this is one of the few EXP-401 sessions in Asia.
0
0
3
OffSec Live Training returns to Taipei on 18–22 Aug! There will be five days of intensive learning led by @offsectraining instructors, covering EXP-401 (OSEE), PEN-300 (OSEP), and WEB-300 (OSWE). It’s Asia’s only EXP-401 in 2H 2025—don’t miss it 👉 https://t.co/1ZZrmjS9zH
2
4
19
Check out Nini's (@terrynini38514) blog on his experience with the #OffSec EXP-401 course and #OSEE certification exam! https://t.co/25GMgcPhQe We'll be hosting EXP-401 again in Taipei, alongside PEN-300 and WEB-300. Don’t miss out! https://t.co/1ZZrmjS9zH
0
1
23
Our latest deep dive explores research on Windows Kernel Streaming. Check out Angelboy’s (@scwuaptx) write-up for key insights and analysis. Read more here: https://t.co/tx4ywZS3YT
#VulnerabilityResearch #Cybersecurity #WindowsKernel #OffensiveCon
devco.re
In-depth research into Windows Kernel Streaming vulnerabilities, revealing MDL misuse, buffer misalignment, and exploitation techniques used in CVE-2024-38238 and others.
1
39
140
Our first confirmation of #Pwn2Own Berlin! Pumpkin (@u1f383) from DEVCORE Research Team used an integer overflow to escalate privs on Red Hat Linux. He earns $20,000 and 2 Master of Pwn points. #P2OBerlin
4
19
151
Angelboy (@scwuaptx) will give a talk at #OffensiveCon this week! Following his deep dive into Kernel Streaming vulnerabilities, this week, Angelboy will unveil a new set of bug classes discovered through his research on one of the most common input sources – webcam frames.
0
5
49
Big congrats to @terrynini38514 on earning Taiwan’s First OffSec OSEE Certification 🙌 After completing Taiwan’s first OffSec Live Training EXP-401 in August last year, NiNi from our research team has officially passed the OSEE exam! #OffSec
0
1
15
Based on last year’s talk at #DEVCORECONFERENCE, our Red Team expert XY breaks it all down in a new blog. over 50% of organizations still have risky AD CS setups—and yes, full domain takeover is still happening. Read more: https://t.co/gn6x2cGY5o
#CyberSecurity #RedTeam #ADCS
devco.re
本文分享我們在實戰上遇到 AD CS 的經驗以及特別的案例,並介紹 AD CS 的基本概念,希望讓企業與對 Active Directory 安全有興趣的讀者了解其重要性和潛在的風險。
0
3
15
DEVCORE CONFERENCE 2025 wrapped, from red team assessment roots to now featuring satellite security, PhaaS, cloud security, exploit hunting and more. Huge thanks to our guest speakers Echo, John, Ashley, GD, and Vic Huang for sharing their cutting-edge research! #cybersecurity
0
2
18
Our latest deep dive explores libarchive vulnerabilities under recent Windows 11 updates. 🔍🔓 Check out NiNi's (@terrynini38514) technical write-up for key insights and security implications. Read more here: https://t.co/MUb7koMIrw
#VulnerabilityResearch
#Cybersecurity
devco.re
Windows 11's KB5031455 update adds RAR and 7z support via libarchive, but DEVCORE discovered multiple vulnerabilities, including Heap Buffer Overflow and arbitrary file operations. Delayed patching...
0
27
79
🤘Congrats Orange(@orange_8361) and Splitline(@_splitline_) on making it to 2024 Top 10 Web Hacking Techniques! Check out their groundbreaking research:
portswigger.net
Welcome to the Top 10 Web Hacking Techniques of 2024, the 18th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year
0
4
33
Congrats to @terrynini38514 on his debut at the 38th Chaos Communication Congress (CCC)! He’ll be presenting “From Convenience to Contagion: The Libarchive Vulnerabilities Lurking in Windows 11,” diving into several vulnerabilities in libarchive—including a RCE exploit.#38c3
0
4
15
This month, @orange_8361 and @_splitline_ revealed a new attack surface at #BHEU, uncovering Windows's deepest Unicode Transformer with wide impacts on well-known applications and OSS projects. Explore the pre-release site while we prepare the full blog: https://t.co/TFExJUhKeX
0
3
28
Angelboy (@scwuaptx) takes the CODE BLUE stage in Japan with his latest insights into Windows Kernel vulnerabilities. Don’t miss it! #MSRC #VulnerabilityResearch #codeblue_jp
CODE BLUE 2024 Speakers Interview #9 🔓Uncovered multiple privilege escalation vulnerabilities in the Windows kernel !! 🐞Windowsカーネルの権限上昇可能な脆弱性を多数発見!! Angelboy Yang/Angelboyヤン 👉Here’s the link! https://t.co/GOvBkOFCTd #codeblue_jp
0
1
10