🤷‍♂️ Profile
🤷‍♂️

@floesen_

Followers
2K
Following
206
Media
2
Statuses
71

Joined October 2020
Don't wanna be here? Send us removal request.
@floesen_
🤷‍♂️
8 months
RT @orangecyberch: 🛡️ In this blog post, @itm4n and @PMa1n extend the work of @floesen_ and demonstrate how Server Silos can be leveraged t….
0
21
0
@floesen_
🤷‍♂️
1 year
RT @chompie1337: i am not trying to argue whether or not Admin -> Kernel should be a security boundary (though based on their own design de….
0
4
0
@floesen_
🤷‍♂️
1 year
Question for the Windows people: Is a „wild“ memcpy to a pool allocation (~100 bytes) with fully controlled source but size=0xffffffff exploitable in any meaningful way? Bug occurs during handling of an IOCTL with transfer type METHOD_BUFFERED (source buffer in kernel memory).
5
4
25
@floesen_
🤷‍♂️
1 year
RT @splinter_code: Bye bye to my admin->kernel priv8 0day 👋.Was sitting on it due to an NDA and i thought it was a quite unique bug, turns….
0
31
0
@floesen_
🤷‍♂️
1 year
Did you know that LSASS has the ability to execute arbitrary kernel-mode addresses? I wrote a small proof of concept that allows administrators to execute unsigned code in the kernel if LSA Protection is disabled.
8
183
509
@floesen_
🤷‍♂️
1 year
RT @m_u00d8: Fuzzing is hard, evaluating fuzzing is harder 🔥. For our new @IEEESSP paper, we studied 150 fuzzing evals and found issues suc….
0
52
0
@floesen_
🤷‍♂️
1 year
If performed remotely, the DoS does not work on clients that have the Remote Event Log feature blocked in their firewall. Whether this is the case, I guess, depends on many factors such as the domain group policies for example.
1
0
5
@floesen_
🤷‍♂️
1 year
A bug allows any user to crash the Windows Event Log service of any other Windows 10/Server 2022 machine on the same domain. According to MSRC, the bug does not meet the bar for servicing and therefore they allowed me to publish a proof of concept.
14
99
253
@floesen_
🤷‍♂️
2 years
RT @Neodyme: When CS:GO clients connected to our server, they got more than a game. We found 3 RCE vulnerabilities to give clients an unexp….
0
151
0
@floesen_
🤷‍♂️
3 years
RT @the_secret_club: Improving MBA Deobfuscation using Equality Saturation by @fvrmatteo and @mr_phrazer.
0
73
0
@floesen_
🤷‍♂️
3 years
RT @daax_rynd: It's been a while. here's the next part of the MMU virtualization series covering some paging details, MTRR basics, and co….
0
85
0
@floesen_
🤷‍♂️
4 years
RT @mr_phrazer: I've released a new version of my #BinaryNinja plugin to detect obfuscated code. In a blog post we evaluate new heuristics….
0
74
0
@floesen_
🤷‍♂️
4 years
RT @mr_phrazer: Giving the workshop on code deobfuscation was great fun. Thanks for your active participation! #HITB2021AMS. Check out code….
0
57
0
@floesen_
🤷‍♂️
4 years
RT @mr_phrazer: Together with @m_u00d8 we are happy to release msynth, our code deobfuscation framework to simplify Mixed Boolean-Arithmeti….
0
58
0
@floesen_
🤷‍♂️
4 years
RT @the_secret_club: Counter-Strike Global Offsets: reliable remote code execution by @brymko @cffsmith @scannell_simon (Guest article). ht….
0
85
0
@floesen_
🤷‍♂️
4 years
RT @bienpnn: "Critical this, critical that, just pay them the same flat amount" - a company that makes billions dollars each year. https://….
0
6
0
@floesen_
🤷‍♂️
4 years
Also, make sure to check out the exploit code if you are interested:
0
3
16
@floesen_
🤷‍♂️
4 years
RT @the_secret_club: CVE-2021-30481: Source engine remote code execution via game invites by @floesen_ .
0
86
0
@floesen_
🤷‍♂️
4 years
It's disclosure time! I hope you enjoy my write-up.
@the_secret_club
secret club
4 years
CVE-2021-30481: Source engine remote code execution via game invites by @floesen_ .
4
8
45
@floesen_
🤷‍♂️
4 years
RT @teapotddd: Here's a demonstration of one of the exploits that I have reported - an unconditional RCE that can be reliably triggered by….
0
16
0