esjay Profile
esjay

@esj4y

Followers
784
Following
2K
Media
14
Statuses
999

Shell horticulturist @codewhitesec - blog @ https://t.co/TAuhn27aSX

Joined January 2019
Don't wanna be here? Send us removal request.
@esj4y
esjay
11 days
Video had bad resolutions, here the better one :)
0
6
33
@esj4y
esjay
11 days
The talk just got uploaded on YT ;)
@esj4y
esjay
19 days
Here are the slides for my Scudo talk yesterday for the MobileHackingLab Con: https://t.co/XPLagjuGs9 it has two extra slides I haven't addressed in my talk. One describing two common misconceptions and one showing the shuffle count for each class.
1
1
13
@esj4y
esjay
19 days
And here two common misconceptions
0
0
0
@esj4y
esjay
19 days
Here the block shuffling count for each class
1
0
0
@esj4y
esjay
19 days
Here are the slides for my Scudo talk yesterday for the MobileHackingLab Con: https://t.co/XPLagjuGs9 it has two extra slides I haven't addressed in my talk. One describing two common misconceptions and one showing the shuffle count for each class.
Tweet card summary image
github.com
slides for talks. Contribute to 3sjay/talks development by creating an account on GitHub.
2
9
64
@0xabe_io
Alexandre Becholey
21 days
Started a blog series on writing a minimal ARM hypervisor from scratch — boots as a UEFI app, claims EL2, identity-maps everything through Stage 2. Chapter 0 just dropped: ARM vs x86 virtualization, UEFI internals, EDK2 setup, first app at EL2. https://t.co/NJ7hQu3VZz
2
52
230
@WHW_0x455
whw
1 month
Bypass PAC in JIT - CVE-2024-27834 And I'm ready for my Spring Festival holiday 🥳 https://t.co/mWc1Ioa5UY
Tweet card summary image
gist.github.com
Bypass PAC in JIT - CVE-2024-27834. GitHub Gist: instantly share code, notes, and snippets.
1
30
136
@codewhitesec
CODE WHITE GmbH
2 months
You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post by @0xor_solo about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165
Tweet card summary image
code-white.com
NetSupport Manager is a remote control and support software that we find surprisingly often utilized in sensitive *Operational Technology (OT)* environments, such as production plant networks....
0
52
139
@SinSinology
SinSinology
3 months
‼️ Feb edition of "Advanced .NET Exploitation" training is now open for 5 students, this will be in Manchester UK 🇬🇧 signup here: https://t.co/biDIcQiFsr
2
15
57
@hzshang15
hzshang
3 months
Here is a detailed bug analysis for MALI GPU CVE-2025-XXXX(6349|8045). We implements a stable privilege escalation on the latest version of the Pixel 9, and leverage a double-free primitive to arbitrary physical memory RW without any info leak. 👍 https://t.co/hJqRwUhwfM
dawnslab.jd.com
GPU 驱动由于其与内存管理的紧密联系,已经成为近年来 Android Kernel 中一个比较有价值的攻击面,与 GPU 相关的 CVE 不算少,但是只有很少数漏洞被公开分析,安全公告中也不会谈及漏洞细节,因此每个版本的 patch 就成了分析漏洞的重要线索。
0
62
247
@codewhitesec
CODE WHITE GmbH
4 months
Our 2024 applicants challenge is officially #roasted: the full BeanBeat × Maultaschenfabrikle walkthrough is now online. Unwrap the write-up at https://t.co/FOspfgRmRc and revisit the hacks that escalated from cold brew to full breach.
Tweet card summary image
apply-if-you-can.com
Applicants Challenge! Face real-world vulns, earn trophies, First Bloods & epic swag!
0
12
34
@u1f383
Pumpkin 🎃
4 months
My HEXACON talk video is out! It covers a small race condition in the Linux kernel’s io_uring. I recommend watching it at 1.25× speed since I’m still not great at speaking 😅 https://t.co/lMuweA7PyU Here is the slide! https://t.co/9jPoKMzxwL
4
46
149
@FuzzySec
b33f | 🇺🇦✊
5 months
I wrote a quick post with some thoughts on Android runtime instrumentation with Frida, looking at SQLite as a case-study. The main focus is on making instrumentation data more useful for scalable analysis. https://t.co/5bKio7qi8W
2
45
173
@__sethJenkins
Seth Jenkins
5 months
We really should be talking about this more....KASLR is just not working properly on Android right now, and it hasn't for a long time. https://t.co/AE0vBXEcob
Tweet card summary image
projectzero.google
IntroductionI’ve recently been researching Pixel kernel exploitation and as part of this research...
5
56
197
@codewhitesec
CODE WHITE GmbH
5 months
Latest ≠ Greatest? A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS from our very own @mwulftange who loves converting n-days to 0-days
Tweet card summary image
code-white.com
How the n-day research for a suspected vulnerability in Microsoft WSUS (CVE-2025-59287) led to the surprising discovery of a new `SoapFormatter` vulnerability added by the Patch Tuesday updates of...
1
52
99
@kmkz_security
kmkz
5 months
Cracking the Pixel 8: Exploiting the Undocumented DSP to Bypass MTE - @Peterpan980927 @st424204 from @starlabs_sg https://t.co/BBogFGPjWc
1
47
193
@datalocaltmp
Luke (datalocaltmp)
5 months
If you're excited to see the WhatsApp bug thrown @thezdi - free to watch my talk from @reconmtl 2025 on 4 remote bugs I discovered last year! While they're not 0-click RCE - there are some remote corruption and funny logic bugs in there. https://t.co/N78H5QeNNZ
3
51
298
@esj4y
esjay
5 months
You're missing the obligatory pizza carton under the notebook
@h4x0r_dz
H4x0r.DZ 🇰🇵
5 months
I’m that guy who always brings his laptop when traveling… and never actually uses it. How do people manage to work in hotels?
0
0
4
@esj4y
esjay
5 months
I now have an Android userspace snapshotter and emulation of the snapshot with unicorn (incl hook for mrs X, TPIDR_EL0) 😎
1
5
46