maxpl0it
@maxpl0it
Followers
10K
Following
5K
Media
49
Statuses
618
Principal Vulnerability Researcher at @InterruptLabs. Occasional Pwn2Owner
London, England
Joined March 2017
Was a lot of fun giving this talk with @patateQbool showing off the stupid stupid stuff we do to pop mobile devices at Pwn2Own
Our OffensiveCon talk is now up on YouTube! https://t.co/ECyDhV4TCc
1
9
54
Another big confirmation! Ben R. And Georgi G. of Interrupt Labs used an improper input validation bug to take over the Samsung Galaxy S25 - enabling the camera and location tracking in the process. They earn $50,000 and 5 Master of Pwn points. #Pwn2Own
3
12
112
Absolutely buzzing! The moment @XploitBengineer and @munmap successfully pwned the Samsung Galaxy S25 at @thezdi Pwn2Own! https://t.co/10EGx2vkH7
0
5
28
Was amazing being a part of this. Thank you everyone who made it such a success and congratulations to the CTF competition winners! š
A HUGE thank you to our sponsors this year. EPIC group. @Margin_Research @osec_io @vector35 @catalystsec @InterruptLabs @kududyn @vigilant_labs
0
2
6
Checkout this 'Pathway to VR' profile from Axel, a Principal Researcher in our Browsers team in the US. Axel chats about how forming a community and presence for yourself online can be a great door-opener in the world of VR.
0
6
36
š£ The latest instalment of our VR Development Programme resources is now available on YouTube! š£ An introduction to ARM64, ARM32 and x86-64 assembly for vulnerability research. https://t.co/F7Y8ktxJEc
0
22
68
š£ Exciting opportunity in our iOS team for a Senior Vulnerability Researcher with experience in Apple platforms. Remote or office based. https://t.co/kxJpQCYNse
jobs.gohire.io
We are looking for experienced and passionate people who have a background in vulnerability research, offensive security and reverse engineering on Apple platforms.Ā Ā Ā Ā Ā The role:Ā You'll join our team...
0
9
41
š£ Exciting news for aspiring vulnerability researchers - a selection of our internal VR Development Program training resources are now available on GitHub! Check them out at https://t.co/B53uulp9Th These ones are on software development: programming in C and Python.
github.com
C and Python training from our Vulnerability Researcher Development Program (VRDP) - interruptlabs/VRDP-C-Python
2
44
152
1
3
22
This guy is way too nice. @SinSinology is one of the greats and itās great to finally meet him face-to-face šŖ
I finally met Max (@maxpl0it) irl, one of the browser gods, He has always been one of my idols impossible to reach his level (^_^)
2
0
77
𤔠Best Meme Target 𤔠WINNER: yltsi: manipulating operator menu settings on a Pump It Up XX: 20th Anniversary Dance Machine šŗ RUNNER UP: @maxpl0it , @InterruptLabs: demoing a 1-Click RCE (XSS + Auth RCE) in mFi mPower Pro WiFi-Enabled Power Extender š
1
3
7
Another great team trip on Wednesday, watching England's Lionesses vs Spain at Wembley. #itscominghome
0
0
10
Announcing #Pwn2Own Berlin! We're moving our enterprise-focused event to @offensive_con and introducing an AI category. More than $1,000,000 in cash & prizes (Incl. a Tesla) are available to win. Check out the details at
zerodayinitiative.com
If you just want to read the contest rules, click here . Willkommen, meine Damen und Herren, zu unserem ersten Wettbewerb in Berlin! Thatās correct (if Google translate didnāt steer me wrong). While...
6
61
254
Really happy I got to be a part of the inaugural DistrictCon Junkyard contest Was lucky enough to be the runner up for the āBest Meme Targetā prize! Huge props to the @DistrictCon crew for overcoming some extremely difficult circumstances Will absolutely be back next year!
@seeinglogic @InterruptLabs @vigilant_labs @Bugcrowd @ex0dus_0x @Ninja3047_ @annatea16 š ClickShock ā”š±ļø @Maxpl0it from @InterruptLabs achieves 1-click RCE (XSS + Auth RCE) in the mFi mPower Pro smart power extender.
1
4
35
With the @InterruptLabs crew in D.C. for @DistrictCon - give us a shout if youāre about!
1
2
25
A fantastic opportunity for an experienced vulnerability researcher to join our word-class Browsers team. Remote work, hybrid or in office opportunities available. Check out our careers page for the full range of roles available globally. https://t.co/e2QsB7whe9
0
14
43
Come for a chat at @DistrictCon to hear about all the exciting things @InterruptLabs is working on. Who doesnāt want to work alongside these legendsā¦. @munmap @maxpl0it
We are thrilled to present our Founding Sponsors for @DistrictCon Year 0! Each Sponsor and Partner is helping us create great content for you. Thank you to each organization for helping us put on the first DistrictCon!
1
7
15
If you're a student or recent graduate in Australia looking to get your hands dirty with vulnerability research, we're looking for hackers to join us for an internship! Check it out:
jobs.gohire.io
We are searching for individuals to join Interrupt Labs over the summer as vulnerability research interns, where you will develop your skills alongside some of the most experienced researchers in the...
0
6
16
The past year has been amazing. From marriage, to Pwn2Own to a Pwnie Award, I'm so grateful. I'm using the money I've won from hacking competitions, bounties, & RB for two ppl to travel & attend Hexacon, the premier offensive security con in Paris, France.
docs.google.com
chompie wants YOU to go to Paris for Hexacon. Fill out this form to apply! Applications will close August 31, 2024 at 11:59pm EST
23
121
575