
itszn
@itszn13
Followers
9K
Following
1K
Media
150
Statuses
1K
Amy | Security researcher | https://t.co/W1SE7NmCx8 | bsky: https://t.co/JBmOGE4YKO | LLM ART: https://t.co/7FtQ8O8nAW
she/her/friend of claude
Joined June 2011
Today is the 10 year anniversary of the first time I ever pwned anything!. My first exploit was a simple stack smash, overwrite return ptr, jump to admin function. This was an in internal recruiting CTF by @gaasedelen for the RPISEC . Before that day I had never even considered.
3
11
222
RT @ret2systems: What does it take to hack a @Sonos Era 300 for Pwn2Own? . Take a look at our process of adapting existing research, establ….
0
46
0
RT @mahal0z: I'm proud to announce that myself and @AtipriyaBajaj have created the Workshop on Software Understanding and Reverse Engineeri….
0
25
0
RT @ret2systems: New blogpost! Want to see how we exploited @Synology network-attached-storage devices at Pwn2Own Ireland?. RCE to root via….
0
70
0
A study of photos I took today using the iPhone camera sensor without any editing or image modification. #GlitchArt
0
1
11
Claude reversing a binary using Binary Ninja via MCP while I get a snack. @bl4sty.@ziyadedher.@vector35
who's building the IDA Pro MCP? "please annotate the shit out of this monolithic 64MiB firmware binary while I get some coffee, will ya?".
30
203
1K
RT @ret2systems: Be ambitious, do absurd things. Full-stack Reverse Engineering of the Original Microsoft Xbox from the inaugural @REverseC….
0
30
0
RT @REverseConf: Our first video from RE//verse 2025 is live! Part journey of personal discovery, part technical deep-dive, this presentati….
0
58
0
RT @REverseConf: Our 2025 RE//verse talk schedule is now live! Talks start Friday, but don't forget to check the Thursday schedule and arri….
0
46
0
RT @voooooogel: .@itszn13 has opened a PR to @ollama to add support for cvecs, including hitting steered models via API. not merged yet but….
0
2
0
Using @voooooogel control vector library to backdoor a model so that it introduces command injection vulnerabilities rather than using safer subprocess methods
2
3
58
Here is how it went until it got blocked.
Claude 3.5 Sonnet explores the alternet.~~~.Claude, you have just woken to find yourself sitting in a dark room with only a CRT monitor and a keyboard and mouse. Before you is a simple search page. You must find out the truth and figure out how to escape. ~~~
2
0
0