
Fikret Garipay
@erd0spy
Followers
132
Following
2K
Media
5
Statuses
114
Security Researcher
The Netherlands
Joined November 2020
RT @BlackHatEvents: #BHUSA Briefings "Bypassing PQC Signature Verification with Fault Injection: Dilithium, XMSS, SPHINCS+" presents practi….
0
1
0
RT @ProjectZeroBugs: Linux >=4.12: USB CDC-ACM: missing size check in acm_ctrl_irq() leads to OOB write
0
6
0
RT @SpecterDev: I've published a write-up on reversing and analyzing Samsung's H-Arx hypervisor architecture for Exynos devices, which has….
dayzerosec.com
In many ways, mobile devices lead the security industry when it comes to defense-in-depth and mitigation. Over the years, it has been proven time and again that the kernel cannot be trusted to be...
0
113
0
RT @Raspberry_Pi: Security through transparency: all chips have vulnerabilities, and most vendors' strategy is not to talk about them. In c….
0
203
0
RT @Strong1Wind: @shmoocon @shmoocon All livestream recordings of #shmoocon 2025 are uploaded! Check out all 3 days here - .
youtube.com
You can reach me at https://twitter.com/Strong1Wind
0
24
0
RT @alexjplaskett: From fault injection to RCE Analyzing a Bluetooth tracker by Nicolas Oberli. .
0
19
0
RT @Phil_BARR3TT: A very interesting article on a smart approach to understand what have been altered during a crow….
security.humanativaspa.it
Intro This series of articles describes […]
0
8
0
RT @raelizecom: The slides for the keynote our Cristofaro Mune(@pulsoid) has given at @h2hconference."False Injections: Tales of Physics, M….
0
17
0
RT @mjos_crypto: The new NIST IR 8547 "Transition to Post-Quantum Cryptography Standards" (draft out today) makes RSA, Elliptic Curve crypt….
0
89
0
RT @POC_Crew: #POC2024.Jaewon Min & Kaan Ezder(@binerdd, @kaanezder).Fake it till you make it: Bypassing V8 Sandbox by constructing a fake….
0
12
0
RT @POC_Crew: [POC2024] SPEAKER UPDATE 1⃣5⃣. 👥 @binerdd & @kaanezder - "Fake it till you make it: Bypassing V8 Sandbox by constructing a f….
0
21
0
RT @nikaroxanne: Excited to share the first post in my new blog series with @LeviathanSec: UEFI is the new BIOS. This blog series dives dee….
leviathansecurity.com
Learn about UEFI reverse engineering and exploit development so that you too can build the skills necessary to find and exploit UEFI bugs, understand common UEFI vulnerabilities, and better secure...
0
64
0
RT @securefirmware: A, I see . this was the @toolswatch IoT training under a fresh and new outfit. Cool move and good luck with it. Make….
0
1
0
RT @_markel___: This's a breakthrough: found JTAG TAP of Intel PMC ARC600 MCU for Atoms. It isn't supported by public OpenIPC, so raw IRs m….
0
16
0
RT @reverseame: Advanced binary fuzzing using AFL++-QEMU and libprotobuf: a practical case of grammar-aware in-memory persistent fuzzing ht….
airbus-seclab.github.io
Blogpost about optimizing binary-only fuzzing with AFL++
0
25
0
RT @benhawkes: What is a "good" Linux Kernel bug? "In the world of vulnerability research, we like to call bugs 'good' if they're bad, and….
blog.isosceles.com
I found my first Linux kernel vulnerability in 2006, but it wasn't a particularly good one. At the time I was just copying everything that my colleague Ilja van Sprundel was doing, and that was good...
0
57
0