esjay
@esj4y
Followers
784
Following
2K
Media
14
Statuses
999
Shell horticulturist @codewhitesec - blog @ https://t.co/TAuhn27aSX
Joined January 2019
The talk just got uploaded on YT ;)
Here are the slides for my Scudo talk yesterday for the MobileHackingLab Con: https://t.co/XPLagjuGs9 it has two extra slides I haven't addressed in my talk. One describing two common misconceptions and one showing the shuffle count for each class.
1
1
13
Here are the slides for my Scudo talk yesterday for the MobileHackingLab Con: https://t.co/XPLagjuGs9 it has two extra slides I haven't addressed in my talk. One describing two common misconceptions and one showing the shuffle count for each class.
github.com
slides for talks. Contribute to 3sjay/talks development by creating an account on GitHub.
2
9
64
Started a blog series on writing a minimal ARM hypervisor from scratch — boots as a UEFI app, claims EL2, identity-maps everything through Stage 2. Chapter 0 just dropped: ARM vs x86 virtualization, UEFI internals, EDK2 setup, first app at EL2. https://t.co/NJ7hQu3VZz
2
52
230
Bypass PAC in JIT - CVE-2024-27834 And I'm ready for my Spring Festival holiday 🥳 https://t.co/mWc1Ioa5UY
gist.github.com
Bypass PAC in JIT - CVE-2024-27834. GitHub Gist: instantly share code, notes, and snippets.
1
30
136
You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post by @0xor_solo about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165
code-white.com
NetSupport Manager is a remote control and support software that we find surprisingly often utilized in sensitive *Operational Technology (OT)* environments, such as production plant networks....
0
52
139
‼️ Feb edition of "Advanced .NET Exploitation" training is now open for 5 students, this will be in Manchester UK 🇬🇧 signup here: https://t.co/biDIcQiFsr
2
15
57
Here is a detailed bug analysis for MALI GPU CVE-2025-XXXX(6349|8045). We implements a stable privilege escalation on the latest version of the Pixel 9, and leverage a double-free primitive to arbitrary physical memory RW without any info leak. 👍 https://t.co/hJqRwUhwfM
dawnslab.jd.com
GPU 驱动由于其与内存管理的紧密联系,已经成为近年来 Android Kernel 中一个比较有价值的攻击面,与 GPU 相关的 CVE 不算少,但是只有很少数漏洞被公开分析,安全公告中也不会谈及漏洞细节,因此每个版本的 patch 就成了分析漏洞的重要线索。
0
62
247
Our 2024 applicants challenge is officially #roasted: the full BeanBeat × Maultaschenfabrikle walkthrough is now online. Unwrap the write-up at https://t.co/FOspfgRmRc and revisit the hacks that escalated from cold brew to full breach.
apply-if-you-can.com
Applicants Challenge! Face real-world vulns, earn trophies, First Bloods & epic swag!
0
12
34
My HEXACON talk video is out! It covers a small race condition in the Linux kernel’s io_uring. I recommend watching it at 1.25× speed since I’m still not great at speaking 😅 https://t.co/lMuweA7PyU Here is the slide! https://t.co/9jPoKMzxwL
4
46
149
I wrote a quick post with some thoughts on Android runtime instrumentation with Frida, looking at SQLite as a case-study. The main focus is on making instrumentation data more useful for scalable analysis. https://t.co/5bKio7qi8W
2
45
173
We really should be talking about this more....KASLR is just not working properly on Android right now, and it hasn't for a long time. https://t.co/AE0vBXEcob
projectzero.google
IntroductionI’ve recently been researching Pixel kernel exploitation and as part of this research...
5
56
197
Latest ≠ Greatest? A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS from our very own @mwulftange who loves converting n-days to 0-days
code-white.com
How the n-day research for a suspected vulnerability in Microsoft WSUS (CVE-2025-59287) led to the surprising discovery of a new `SoapFormatter` vulnerability added by the Patch Tuesday updates of...
1
52
99
Cracking the Pixel 8: Exploiting the Undocumented DSP to Bypass MTE - @Peterpan980927 @st424204 from @starlabs_sg
https://t.co/BBogFGPjWc
1
47
193
If you're excited to see the WhatsApp bug thrown @thezdi - free to watch my talk from @reconmtl 2025 on 4 remote bugs I discovered last year! While they're not 0-click RCE - there are some remote corruption and funny logic bugs in there. https://t.co/N78H5QeNNZ
3
51
298
I now have an Android userspace snapshotter and emulation of the snapshot with unicorn (incl hook for mrs X, TPIDR_EL0) 😎
1
5
46