imarcex_ Profile Banner
marce Profile
marce

@imarcex_

Followers
271
Following
3K
Media
2
Statuses
155

web security @ Doyensec

🇪🇸
Joined September 2019
Don't wanna be here? Send us removal request.
@Doyensec
Doyensec
2 months
We'd like to welcome our newest addition Marcelino Siles Rubia (@imarcex_)! Another success story from our #internship program! The future of #appsec is looking bright 😎 at #doyensec!
0
6
28
@Doyensec
Doyensec
5 months
We'd like to welcome 👋@imarcex_ as our latest Application Security Intern. Welcome aboard! 🎉 #doyensec #appsec #internship
0
6
27
@luucmcho
lu.🕊️
7 months
me he creado un canal de youtube donde subo vlogs, charlitas y demás :) os agradecería mucho que le dierais amor🤍 link abajo
1
1
3
@klecko0
Klecko
1 year
I've written a post on SELinux and some public bypasses for Android kernel exploitation. It's especially relevant for Samsung and Huawei devices due to their use of hypervisors. Check it out here:
klecko.github.io
This post aims at giving an overview of what SELinux is, how it is implemented, and how to bypass it, from the point of view of Android kernel exploitation.
10
129
417
@zeroclicksh
zeroclick.sh
1 year
🚀 We're back with a fresh blog redesign! Dive into @Diego_AltF4's latest post, which offers an in-depth analysis of CVE-2023-22098, including a reliable PoC to escape VirtualBox. 🛠️ Unleash your virtualization magic now! Link below ⬇️
1
20
45
@HackOnURJC
HackOn
1 year
🚨🚨ATENCÓN🚨🚨 #HackOn2025 ya tiene fecha oficial🎉. Por primera vez, el evento tendrá lugar durante dos días: 28 de febrero y 1 de marzo ⏳Próximamente comunicaremos más novedades de esta edición⌛️
0
18
43
@zeroclicksh
zeroclick.sh
1 year
🚀 New blog alert! 🚀 Dive deep with our latest posts: 🍎 "TCC Overview and Internals" - Learn how one of the main macOS protections work 🐝"Intro to Development Using eBPF" - Start your journey with eBPF and Docker! Hope you enjoy the new content made by @esquilichii
0
6
20
@offensive_con
offensivecon
1 year
Beyond Android MTE: Navigating OEM's Logic Labyrinths by @patateqbool @maxpl0it @MateuszFruba and @munmap now live!
2
16
84
@klecko0
Klecko
5 years
This is what I've been doing for the last few weeks! I'm trying to write a hypervisor-based fuzzer to fuzz linux userspace binaries at native speed while having fast memory resets and code coverage https://t.co/zEmqDDnAn2
Tweet card summary image
github.com
PoC of fuzzing closed-source userspace binaries with KVM - klecko/kvm-fuzz
3
68
255
@zerodaytraining
Zero Day Engineering
2 years
Patch candidate for Chrome v8 Use-after-free to RCE bug (CVE-2024-3914) exploited by @0x10n at Pwn2Own 2024 Vancouver against both Chrome and Microsoft Edge. Patched in Chrome 124.0.6367.60/.61 This is not "quite" v8 - it's kinda blink reachable from v8. Classic array neutering
1
28
106
@imarcex_
marce
2 years
Check this out. Some friends and I decided to set up a blog. Hope you like it, feedback is welcomed :)
@zeroclicksh
zeroclick.sh
2 years
New post is up!! . Tired of not solving FSOP challenges on the latest libc? You don't need to look any further;) Intro to FSOP exploitation and House of Paper by @pop_rdi_ret https://t.co/6qD3MmO1KK
0
0
4
@zeroclicksh
zeroclick.sh
2 years
Easy right? Well then here is the writeup for a CTF pwn challenge that requires both linux heap and FSOP exploitation techniques. @pop_rdi_ret is the creator of both the challenge and the write up. https://t.co/3G96Ev7MEq
@zeroclicksh
zeroclick.sh
2 years
New post is up!! . Tired of not solving FSOP challenges on the latest libc? You don't need to look any further;) Intro to FSOP exploitation and House of Paper by @pop_rdi_ret https://t.co/6qD3MmO1KK
1
4
7
@zeroclicksh
zeroclick.sh
2 years
New post is up!! . Tired of not solving FSOP challenges on the latest libc? You don't need to look any further;) Intro to FSOP exploitation and House of Paper by @pop_rdi_ret https://t.co/6qD3MmO1KK
0
7
5
@zeroclicksh
zeroclick.sh
2 years
Keep calm and Qemu on!! If you want to see how to exploit a vulnerable PCI device and escape from Qemu, take a look at the writeup that @Diego_AltF4 and @t0ct0u have prepared about their HackOn 2024 challenge. https://t.co/xGPbRvCCMg
1
17
30
@zerodaytraining
Zero Day Engineering
2 years
This looks like a candidate for Chrome v8 0day bug used by @_manfp in his Pwn2Own 2024 exploit (CVE-2024-2887, just patched in Chrome stable 123.0.6312.86/.87) wasm module decoder had a missing check of type section size in a branch of DecodeTypeSection, easy to spot manually:
1
19
111
@maxpl0it
maxpl0it
2 years
@_manfp’s Firefox renderer bug is a beauty that takes advantage of an optimisation implemented just 3 months ago. Let’s break it down!
5
94
419
@HackOnURJC
HackOn
2 years
Empezamos a calentar motores para #HackOn2024 🔥, por eso sorteamos 1 entrada para la @rootedcon de Madrid. Para participar debes: 📝Seguirnos @HackOnURJC 🔁RT 🗓️Asistir el día 22 al evento Tienes hasta el día 21 de febrero para participar. ¡Suerte a todos!🍀
1
39
19
@HackOnURJC
HackOn
2 years
🚨Confirmamos cuarto taller🚨 Daniel Monzón (@stark0de1) y Diego Palacios (@Diego_AltF4), alumno del grado de Ingeniería de la Ciberseguridad, impartirán un taller utilizando la técnica Fuzzing para el crasheo de programas. 👨‍💻 Gracias por participar en la #HackOn2024.🎉
0
12
20
@gf_256
cts🌸
3 years
Choose your fighter (Advent of Code)
88
1K
7K
@HackOnURJC
HackOn
2 years
¡Preparados, listos, apunta la fecha! 📆 La VI edición de #HackOn está a la vuelta de la esquina. Anotad el 22/02/2024 en vuestros calendarios. ¡La cuenta atrás ha comenzado! ⏳ #HackOn2024
1
23
34