legoclones Profile Banner
Legoclones Profile
Legoclones

@legoclones

Followers
160
Following
2K
Media
7
Statuses
51

BYU Cyber student, former CTFer (Project Sekai & US Cyber Team), security researcher in free time. I do everything except Crypto (math is hard)

Joined March 2022
Don't wanna be here? Send us removal request.
@legoclones
Legoclones
22 days
Thank you!! We had a lot of fun!.
@EmbeddedVillage
EmbeddedSystemsVillage
23 days
That's a wrap on the DC33 ESV CTF! Congrats to BYUpwny on taking first place!!🏆 @defcon @defcon #defcon33
Tweet media one
0
0
4
@legoclones
Legoclones
3 months
Uhhh I'm a little late posting this on Twitter but I made a comprehensive writeup for how we (BYU) exploited a memcmp() side channel for eCTF 2025 to get flags 🚩
0
0
5
@grok
Grok
6 days
Join millions who have switched to Grok.
240
475
4K
@legoclones
Legoclones
8 months
Finally decided to finish a project that's been in the works for a while, I wrote some pretty in-depth (but unofficial) documentation for Python pickles -
Tweet card summary image
github.com
Unofficial documentation for the Python Pickle deserialization protocol - Legoclones/pickledoc
0
0
12
@legoclones
Legoclones
1 year
Thank you to everyone who came to our @IoTvillage #defcon32 talk! We spoke about finding 0days in Vilo Home Routers, and have published our research and slides on GitHub
Tweet card summary image
github.com
Documentation for Vilo router vulnerability research - byu-cybersecurity-research/vilo
0
5
14
@legoclones
Legoclones
1 year
If you're going to be at DEFCON this year, come to Creator Stage 2 on Sunday at 12:30 for our talk on how we discovered 9x 0days in Vilo Home Routers!
Tweet media one
2
0
24
@legoclones
Legoclones
1 year
pickledbg has been updated so it's now installable as a Python module. Note that pip install pickledbg will also make it runnable on the cmdline
Tweet card summary image
github.com
A GDB+GEF-style debugger for unloading Python pickles - Legoclones/pickledbg
0
2
12
@legoclones
Legoclones
1 year
Happy to announce I will be speaking at @IoTvillage for @defcon 32 with 2 of my schoolmates!! We will be speaking about how we discovered the first 0days for Vilo Home Routers!
Tweet media one
5
3
37
@legoclones
Legoclones
1 year
Here's a writeup for the challenge Everlasting_Message, a reverse engineering challenge from @CODEGATE_KR 2024 Quals:
0
1
13
@legoclones
Legoclones
1 year
RT @h0mbre_: my biggest fear is posting something like “very interesting bug i found that results in a very tight race condition, unfortuna….
0
8
0
@legoclones
Legoclones
2 years
Just realized that I recently passed my 100th CTF that I've either played in or hosted!! I started in 2020, so it's been about 3.5 years total. Hats off to another hundred!.
3
0
25
@legoclones
Legoclones
2 years
Played in @SAINTCON's Hackers Challenge this past week and placed 1st, getting the black badge!! I ended solving all the challenges and loved every minute of it. Great job by an awesome staff who keep it relevant and exciting every year!
Tweet media one
Tweet media two
2
3
28
@legoclones
Legoclones
2 years
After doing some pickle CTF problems, I decided to make a Pickle Debugger tool (called pickledbg), and after using it in Seccon, I'm releasing it to the public. More stuff will come later but here's the finished product -
Tweet card summary image
github.com
A GDB+GEF-style debugger for unloading Python pickles - Legoclones/pickledbg
2
12
42
@legoclones
Legoclones
2 years
After encountering a bug in HITB Secconf CTF, I did some research into Flask's request.authorization object and how Authorization headers are parsed according to changes introduced in Flask 2.3. Read about that & interesting edge cases here
0
0
4
@legoclones
Legoclones
2 years
Published the source code and writeups for 3 challenges I made for the @RedTeamVillage_ CTF at DEFCON 31, the Home Network series. Check it out here -->
github.com
Challenge series for DEFCON 31 RTV CTF. Contribute to Legoclones/RTVCTF-2023-challenges development by creating an account on GitHub.
0
4
22
@legoclones
Legoclones
2 years
Finally got the CVEs reserved for my last 2 GL.iNET vulnerabilities, CVE-2023-33620 and CVE-2023-33621! Just requested for them to be published.
1
0
7
@legoclones
Legoclones
2 years
this ctf smh
Tweet media one
1
1
3
@legoclones
Legoclones
2 years
I still haven't finished looking through all the endpoints or the new 4.x firmware version, so expect some more findings from me in the next couple of months!.
2
0
2
@legoclones
Legoclones
2 years
Last, I copied all the files from 3 separate versions of the filesystem to a GitHub repo to make it easier for other researchers to search for vulns. AAAAND I created a cool Python script that can be used to scan your own GL.iNET device (.
github.com
Files and a scanner for pentesting GL.iNET IoT devices - Legoclones/pentesting-GL.iNET
1
0
1
@legoclones
Legoclones
2 years
The last 2 CVEs are the same default HTTPS certificate across ALL routers (enabled MITM), and the Admin Token was passed through a GET parameter ( . CVEs have been requested on these 2 but I haven't heard back yet.
1
0
1
@legoclones
Legoclones
2 years
I also found a buffer overflow vulnerability in one of their library functions, guci2_get() (.
1
0
0