flanker017
@flanker_hqd
Followers
5K
Following
126
Media
18
Statuses
292
Protect your LLMs with JoySafety, JD's new open-source enterprise-level AI security framework! Battle-tested in production environment to cut prompt injection attacks (>95% reduction) with millisecond-level real-time response. Deploy in minutes via Docker. https://t.co/gtoY2UrzGP
github.com
JoySafety. Contribute to jd-opensource/JoySafety development by creating an account on GitHub.
0
1
1
Checkout this open-sourced handy MCP server for JEB decompiler by us: https://t.co/LXSEFtSbFx . Contributions and use cases are always welcomed.
github.com
Contribute to dawnslab/jebmcp development by creating an account on GitHub.
1
7
42
Years later it’s still thrilled to be on #DEFCON stage. The presentation has been released here: https://t.co/NYNGSYf0zk
0
8
96
New blog post: A journey in Android physical memory - writeup on exploiting recent GPU bug CVE-2025-21479
dawnslab.jd.com
背景 在大多数用户的印象里,GPU(图形处理器)是游戏流畅、视频绚丽的保障,是沉浸在虚拟世界背后的无名英雄。然而,在现代移动计算架构,尤其是在安卓生态中,GPU的角色早已超越了“图形画师”的范畴。它通过诸如OpenCL、Vulkan等通用计算框架,深度参与到机器学习、图像处理、甚至安全计算等关键任务中,成为了SoC(系统级芯片)中与CPU平起平坐的“第二颗大脑”。 正是这种权限与复杂性的与日俱增
0
86
278
The open-sourced version is finally here! https://t.co/UKaScLodYm We're still adding support for some corner cases, so keep an eye for future updates.
github.com
Contribute to jd-opensource/arkdecompiler development by creating an account on GitHub.
Our presentation at this year's Black Hat Arsenal on Decompiler for HarmonyOS NEXT. Stay tuned for future open source release.
0
4
15
Our talk on #BadResolve series of CVEs in Android happening soon at 13:30 #defcon33 Main Stage: LVCC - L1 - Exhibit Hall West 3 - Track 4!
0
2
15
New post: https://t.co/5hdBHqve8t writeup for CVE-2025-22056, which we also found but collide with other researchers. A nice bug that can be stably exploited to get kernel privilege on Ubuntu.
0
8
30
Punching 🥊 presentation from @hzshang15 , 𝐒𝐢𝐦𝐩𝐥𝐞 𝐢𝐬 𝐁𝐞𝐬𝐭: 𝐓𝐡𝐞 𝐣𝐨𝐮𝐫𝐧𝐞𝐲 𝐨𝐟 𝐭𝐚𝐤𝐢𝐧𝐠 𝐨𝐯𝐞𝐫 𝐦𝐨𝐛𝐢𝐥𝐞 𝐬𝐲𝐬𝐭𝐞𝐦 𝐮𝐬𝐢𝐧𝐠 𝐚 𝐆𝐏𝐔 𝐥𝐨𝐠𝐢𝐜𝐚𝐥 𝐛𝐮𝐠. We 🩷 it at @offbyoneconf 2025!
0
4
15
Years later it's thrilled to back to Vancouver and speak again at CanSecWest. Brought to mind the good old days of playing Pwn2Own.
0
1
10
"Apple CarPlay: What's Under the Hood" - the newest and most detailed public research on CarPlay I've seen so far. Security analysis and fun memes included! 🚘 📲 🔬 Presentation [PDF]: https://t.co/PrmYmZ7D4O Video: https://t.co/7f3mTo5oVg
2
99
457
The Pwnie brothers (or sisters?) in a row - left: most underhyped research, 2024, @CodeColorist right: best privilege escalation, 2022, mine. @PwnieAwards
0
0
16
Congrats to all the pwnie award winners this year, especially to my friend @CodeColorist and @ga1ois! Met many new friends in the @PwnieAwards afterparty, a great experience. Also made up for not being able to receive my award in person in 2022.
2
0
20
Finished our talk at @BlackHatEvents with @Guluisacat. Will be hanging around today and tmw at @defcon and 0x0G. Chats and meetup are always welcomed.
0
1
8
We will be at Las Vegas this year to deliver our talks by @Guluisacat @flanker_hqd @TheDog0402 at @BlackHatEvents, see ya
0
1
12
Our new blog post -- AVSS Report: System Security Adversarial Capability Preliminary Evaluation of iOS, Android, and HarmonyOS - Kernel https://t.co/nsjk9eWaGM
darknavy.org
As consumers, when faced with five different brands and models of smartphones or ten different smart cars, it’s difficult for us to determine which one can effectively prevent our privacy from being...
0
8
31
Our team will deliver a talk on mobile ad fraud campaigns
GEEKCON 2024 International is just one month away! We're thrilled to unveil the official schedule and topics! Dive deep into over 30 technical programs, join 40+ white-hat hacker teams, and mark your calendars for May 25th & 26th in Singapore! 👏Huge thanks to our ommitte,
0
0
9
Happy Year of the Loong! 🎉🐉 GEEKCON 2024 International Conference & Contest will be holding on May 25 - 26. Mark your calendars and stay tuned for updates. Calling all geeks and security enthusiasts! Join us and take the challenge now! https://t.co/yuLEXL17mC
0
2
5
We've successfully exploited three RCE chains in Steam, one of which chains 4~6 pure logical bugs (features). Memory corruption vulnerabilities were also exploited. Stay tuned for the technical details on our blog after Valve fixes them.
4
31
125