Dooflin5 Profile Banner
Maxwell ꓘ Dulin (Strikeout) Profile
Maxwell ꓘ Dulin (Strikeout)

@Dooflin5

Followers
1K
Following
2K
Media
97
Statuses
3K

God First ✞ | Web3 & Web2 Security Researcher (Hacker) | Gonzaga U & Centralia HS Grad | Wiffleball with @ctownwiffle | Dodgeballer |

Seattle/Centralia, WA
Joined February 2013
Don't wanna be here? Send us removal request.
@Dooflin5
Maxwell ꓘ Dulin (Strikeout)
1 year
I taught a killer training of glibc malloc heap exploitation for several years. After some effort, the content is now open source and mostly ready to consume! Half of the videos are posted for the course. 🔥 https://t.co/4ewnAmO3Z1
Tweet card summary image
github.com
The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation. - SecurityInnovation/glibc_heap_exploitation_training
6
102
334
@DevDacian
Dacian
14 days
Recent private audit client was thinking about launching fast after an audit by another firm produced only 1 Crit. But they postponed the launch after our on-going audit produced 6 Highs and counting! The last audit before mainnet should feel like it wasn't worth it.
3
2
74
@LiveOverflow
LiveOverflow 🔴
2 months
Fuzzing and vibe hacking is addicting like gambling: 1. Spend cash to buy token credits or compute 2. Hope to get bugs 3. Repeat
7
19
292
@Dooflin5
Maxwell ꓘ Dulin (Strikeout)
2 months
Most of the bugs I find while fuzzing are simply issues with the fuzzer I wrote. Improper bug detection and incorrect modifications to the target are good examples. Just keep iterating and iterating some more until it works as planned.
0
0
1
@Dooflin5
Maxwell ꓘ Dulin (Strikeout)
2 months
Clearing my office today and found a @lauriewired puzzle cube! Only took me 3 years to solve ;)
0
2
33
@AISecHub
AISecHub
3 months
LLMs are pretty good at some things and bad at others for security engineers. I use them a lot but very strategically. https://t.co/tE3fKsURXe By @Dooflin5 at @asymmetric_re As Google, Stack Overflow, and now LLMs become embedded in our workflows, we must ask: are they
Tweet card summary image
maxwelldulin.com
LLMs can speed up security tasks like code comprehension and proof of concept creation. But, over-reliance risks missing subtle vulnerabilities and weakening core skills. How do we use LLMs optimally?
0
3
7
@Dooflin5
Maxwell ꓘ Dulin (Strikeout)
3 months
LLMs are pretty good at some things and bad at others for security engineers. I use them a lot but very strategically. Here are my thoughts: https://t.co/UIBI8GIbNa
Tweet card summary image
maxwelldulin.com
LLMs can speed up security tasks like code comprehension and proof of concept creation. But, over-reliance risks missing subtle vulnerabilities and weakening core skills. How do we use LLMs optimally?
0
0
3
@asymmetric_re
asymmetric research
3 months
Threat Contained: marginfi Flash Loan Vulnerability by @_fel1x A new instruction broke the flash loan logic, creating a way to borrow without repaying and putting $160M at risk. We explain the vulnerability, potential impact, and how it was fixed. Full post below ↓
6
27
154
@ThePrimeagen
ThePrimeagen
4 months
i never saw this coming
328
1K
21K
@Dooflin5
Maxwell ꓘ Dulin (Strikeout)
5 months
This is how I first learned binary exploitation. Absolutely amazing content! The students who made this deserve an award from the school.
@alexjplaskett
Alex Plaskett
5 months
Modern Binary Exploitation by @RPISEC. This was a university course developed and run solely by students to teach skills in vulnerability research, reverse engineering, and binary exploitation. https://t.co/AFSHDwdCJ5
1
0
14
@Dooflin5
Maxwell ꓘ Dulin (Strikeout)
6 months
The last few @ctbbpodcast episodes have been amazing with great topic curation and discussions. 🔥 The new alpha of the self-XSS exploit method using the new “fetch later” casually being dropped was mind boggling. 🤯
0
0
1
@jeffsecurity
Jeff Security
6 months
You find a bug at 03:00. Two options: - Sleep and submit it tomorrow - Stay up, work hard and submit it One makes the odds of owning a Lambo in ur favor, the other ensures tomorrow will be the same mundane day. Make your choice! 😎
1
1
7
@johnsaigle
John Saigle
7 months
PSA: Pretty much every "Solana/Anchor top vulnerabilities" checklist I've seen has numerous entries that are wrong. Either the remediations are wrong or entire bug classes are made up (perhaps hallucinated?)
5
1
23
@ErrataRob
Robert Graham
7 months
I want to break into the field of "cybersecurity". Can anybody explain to me what "Bitcoin style encryption" is, and how it applies to encrypted chat? There's so much I don't know.
@elonmusk
Elon Musk
7 months
All new XChat is rolling out with encryption, vanishing messages and the ability to send any kind of file. Also, audio/video calling. This is built on Rust with (Bitcoin style) encryption, whole new architecture.
29
10
191
@asymmetric_re
asymmetric research
7 months
New blog post: An Intro to Differential Fuzzing in Rust, by @nl_gripto & @anarcheuz. It walks through building a pure-Rust JSON fuzzer from scratch, then extending it into a differential fuzzing harness capable of surfacing consensus bugs. https://t.co/yrwtnxAozi
Tweet card summary image
blog.asymmetric.re
In the year 2050, a malformed JSON input lead to the complete shutdown of the Replicant P2P network. Today, we'll reproduce this bug class in ~100 lines of code.
1
24
91
@Dooflin5
Maxwell ꓘ Dulin (Strikeout)
8 months
Sometimes you find a stinky code pattern that's not exploitable now but may be in the future with some foreseeable changes. Write these down and revisit them in the future - you'll be happy you did.
0
0
5
@Dooflin5
Maxwell ꓘ Dulin (Strikeout)
8 months
Did the laser really burn a whole in the device!? That’s wild.
0
0
3
@richinseattle
Richard Johnson
8 months
Fun talk at #CSW2025 on voice cloning and deep faking! This type of attack is part of my upcoming AI for Cybersecurity training at Recon and Hexacon! (It’s on the hexacon syllabus but I need to update Recon)
@crpr4real
Creeper
8 months
Heading to #CSW2025 today, hit me up if you will be there and want to meetup! (ill also be at @Defcon604 ) See y'all soon.
0
2
6
@Dooflin5
Maxwell ꓘ Dulin (Strikeout)
8 months
The best feedback one can receive ❤️ let’s talk turkey and not waste time with fluff.
@totdking
Konquest .
8 months
@asymmetric_re @Dooflin5 Looks good, informative and straight to the point
0
1
2
@asymmetric_re
asymmetric research
8 months
New blog post: Navigating Vulnerabilities in Solana CPIs, by @dooflin5. It breaks down how unchecked programs, signer privileges, and account handling pitfalls can lead to exploits—and how developers can design defensively. https://t.co/1RV6OglX58
Tweet card summary image
blog.asymmetric.re
Cross-program invocation (CPI) is the mechanism on Solana through which one program calls another. It's used for system instruction calls, SPL token transfers, custom program execution, and even...
2
23
73
@Dooflin5
Maxwell ꓘ Dulin (Strikeout)
8 months
I'll be speaking at CanSecWest in Vancouver, BC on Friday about blockchain bridge security. I'm stoked to share innovations in security from the web3 space with the rest of the world! https://t.co/fwuyYF6nFV
Tweet card summary image
secwest.net
$624 million lost in the Ronin hack. $611 million in the Poly Network exploit. These headlines share a common thread: security failures in the design and implementation of blockchain bridges—critical...
0
1
13