
DEVCORE
@d3vc0r3
Followers
4K
Following
28
Media
21
Statuses
117
Congrats to Orange (@orange_8361) for making @PortSwigger’s Top 10 Web Hacking Techniques again — and to splitline (@_splitline_) for the debut. #1 Confusion Attacks — Apache HTTP Server. #4 WorstFit — Windows ANSI. #DEFCON
0
3
37
RT @orange_8361: Thanks @PortSwigger and @BugBountyDEFCON for this awesome event — and also to my @d3vc0r3 buddies for standing on stage to….
0
31
0
How tough is the @offsectraining #OSEE exam? . Orange (@orange_8361) lays out his exam-prep journey, personal reflections, and the key lessons from the EXP-401 (AWE) course. Explore the full story (TC) here:
0
1
32
OffSec Live Training returns to Taipei on 18–22 Aug!. There will be five days of intensive learning led by @offsectraining instructors, covering EXP-401 (OSEE), PEN-300 (OSEP), and WEB-300 (OSWE). It’s Asia’s only EXP-401 in 2H 2025—don’t miss it.👉
2
4
19
Check out Nini's (@terrynini38514) blog on his experience with the #OffSec EXP-401 course and #OSEE certification exam!. We'll be hosting EXP-401 again in Taipei, alongside PEN-300 and WEB-300. Don’t miss out!.
0
1
23
Our latest deep dive explores research on Windows Kernel Streaming. Check out Angelboy’s (@scwuaptx) write-up for key insights and analysis. Read more here: #VulnerabilityResearch #Cybersecurity #WindowsKernel #OffensiveCon.
devco.re
In-depth research into Windows Kernel Streaming vulnerabilities, revealing MDL misuse, buffer misalignment, and exploitation techniques used in CVE-2024-38238 and others.
1
39
140
Angelboy (@scwuaptx) will give a talk at #OffensiveCon this week!. Following his deep dive into Kernel Streaming vulnerabilities, this week, Angelboy will unveil a new set of bug classes discovered through his research on one of the most common input sources – webcam frames.
0
5
49
Big congrats to @terrynini38514 on earning Taiwan’s First OffSec OSEE Certification 🙌 . After completing Taiwan’s first OffSec Live Training EXP-401 in August last year, NiNi from our research team has officially passed the OSEE exam! . #OffSec.
0
1
15
Based on last year’s talk at #DEVCORECONFERENCE, our Red Team expert XY breaks it all down in a new blog. over 50% of organizations still have risky AD CS setups—and yes, full domain takeover is still happening. Read more: #CyberSecurity #RedTeam #ADCS.
devco.re
本文分享我們在實戰上遇到 AD CS 的經驗以及特別的案例,並介紹 AD CS 的基本概念,希望讓企業與對 Active Directory 安全有興趣的讀者了解其重要性和潛在的風險。
0
3
15
DEVCORE CONFERENCE 2025 wrapped, from red team assessment roots to now featuring satellite security, PhaaS, cloud security, exploit hunting and more. Huge thanks to our guest speakers Echo, John, Ashley, GD, and Vic Huang for sharing their cutting-edge research!. #cybersecurity
0
2
17
Our latest deep dive explores libarchive vulnerabilities under recent Windows 11 updates. 🔍🔓. Check out NiNi's (@terrynini38514) technical write-up for key insights and security implications. Read more here: #VulnerabilityResearch.#Cybersecurity.
devco.re
Windows 11's KB5031455 update adds RAR and 7z support via libarchive, but DEVCORE discovered multiple vulnerabilities, including Heap Buffer Overflow and arbitrary file operations. Delayed patching...
0
27
80
🤘Congrats Orange(@orange_8361) and Splitline(@_splitline_) on making it to 2024 Top 10 Web Hacking Techniques!. Check out their groundbreaking research:
portswigger.net
Welcome to the Top 10 Web Hacking Techniques of 2024, the 18th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year
0
4
33
Congrats to @terrynini38514 on his debut at the 38th Chaos Communication Congress (CCC)!. He’ll be presenting “From Convenience to Contagion: The Libarchive Vulnerabilities Lurking in Windows 11,” diving into several vulnerabilities in libarchive—including a RCE exploit.#38c3
0
4
15
This month, @orange_8361 and @_splitline_ revealed a new attack surface at #BHEU, uncovering Windows's deepest Unicode Transformer with wide impacts on well-known applications and OSS projects. Explore the pre-release site while we prepare the full blog:
0
3
28
Angelboy (@scwuaptx) takes the CODE BLUE stage in Japan with his latest insights into Windows Kernel vulnerabilities. Don’t miss it!. #MSRC #VulnerabilityResearch #codeblue_jp.
CODE BLUE 2024 Speakers Interview #9. 🔓Uncovered multiple privilege escalation vulnerabilities in the Windows kernel !!.🐞Windowsカーネルの権限上昇可能な脆弱性を多数発見!!. Angelboy Yang/Angelboyヤン. 👉Here’s the link!. #codeblue_jp
0
1
10
#POC2024 kicks off this week! 🚀. Catch Pumpkin (@u1f383)’s debut talk on his breakthrough exploitation technique from #Pwn2OwnVancouver2024: "How I use a novel approach to exploit a limited OOB on Ubuntu at Pwn2Own Vancouver 2024". #VulnerabilityResearch #Ubuntu #CyberSecurity.
[POC2024] SPEAKER UPDATE 2⃣. 👤 @u1f383 - "How I use a novel approach to exploit a limited OOB on Ubuntu at Pwn2Own Vancouver 2024". #POC2024
0
3
21