nn_amon Profile Banner
amon Profile
amon

@nn_amon

Followers
414
Following
3K
Media
37
Statuses
1K

infosec. The Potatosploiter of Nandy Narwhals. @[email protected]

Singapore
Joined October 2012
Don't wanna be here? Send us removal request.
@alexjplaskett
Alex Plaskett
5 days
Modern iOS Security Features – A Deep Dive by Moritz Steffin and @naehrdine https://t.co/FRdenEEfqB
4
140
615
@k_firsov
Kirill Firsov
11 days
A little morning research. New React/Next.js CVE-2025-55183 Source code leakage PoC Bypasses Cloudflare! @FearsOff #react #bypass #cloudflare
15
82
528
@___prosti
Gabriel Prostitis
15 days
stop using ubuntu 24.04 to host your kernel pwn challenges lmao https://t.co/uCCNthelDn
5
85
573
@bruce30262
Bruce Chen
4 months
Made a pwn challenge for this year’s HITCON CTF, which required participants to bypass PAC, BTI, and deal with relative vtables. Here’s the write-up: https://t.co/5IrEynUF3T Check it out if you're interested🙂
bruce30262.github.io
Intro It all started when CK asked me if I could create challenges for this year’s HITCON CTF. As a retired CTF player, I initially replied, “Well… maybe? I’ll see what I can come up with, but...
0
44
194
@orange_8361
Orange Tsai 🍊
4 months
Turns out my #PHRACK article is live! 🔥 > The Art of PHP — My CTF Journey and Untold Stories! Kinda a love letter to those CTF players & PHP nerds! Hope all the credit goes to the right ppl. Also huge thanks to @0xdea for not forgetting me, @guitmz for the edits, and the
20
220
889
@tylerni7
tylerni7
4 months
LLM skeptics (or LLM curious folks) should read through @theori_io 's blog walking through what our LLM agents accomplished in #AIxCC (in testing before the contest) https://t.co/MfCwI0J42A you can just read the traces directly, but this points out some of the most fun :)
Tweet card summary image
theori.io
Agent trajectory walkthroughs of a fully autonomous hacking system | AI for Security, AIxCC
0
26
97
@nn_amon
amon
5 months
Another great badge this year by @ANDnXOR! #mattdamon #mainedoesnotexist
1
3
24
@0xAX
Alex
9 months
Apple’s Darwin OS and XNU Kernel Deep Dive
tansanrao.com
1
50
258
@chompie1337
chompie
9 months
If you ever think there are no more bugs left to find… this Linux kernel bug was just patched yesterday and existed for 5 YEARS
89
287
5K
@ifsecure
Ivan Fratric 💙💛
9 months
A real-world example of an issue I posted in a challenge recently, where std::stable_sort is not memory safe when the comparator doesn't adhere to strict weak ordering.
@ProjectZeroBugs
Project Zero Bugs
9 months
Firefox: inconsistent comparator in xslt/txNodeSorter leads to out-of-bounds access
1
13
75
@junr0n
jro
9 months
Writeup on how the PoC was designed, some observations, comparisons with other decompiler MCPs and thoughts: https://t.co/Zx6muUIwBM
jro.sg
Crafting malicious binaries that trick LLMs into executing code
@junr0n
jro
9 months
Some IDA MCP servers can be tricked into executing arbitrary code directly from the malware sample
3
47
192
@starlabs_sg
starlabs
9 months
CimFS: Crashing in memory, Finding SYSTEM! @cplearns2h4ck dug into Microsoft CimFS, found a sneaky 0-day, and guess what? The fix by Microsoft was just locking the door 🔐on unprivileged users. 😂 Dive into the adventure with us:
Tweet card summary image
starlabs.sg
Introduction Many vulnerability writeups nowadays focus on the exploitation process when it comes to software bugs. The term “Exploit Developer” is also still used synonymously with Vulnerability...
1
61
163
@ifsecure
Ivan Fratric 💙💛
9 months
Since a lot of you seem to have liked my previous challenge, here's a new one. The goal is, once again, to find a bug and leak the secret. BTW all AI-generated responses failed quite spectacularly last time, so perhaps it's better if you refrain from using it.
16
36
229
@carste1n
Michal Melewski
9 months
A friend of mine (@gynvael) is organizing a course about reversing binary files and protocols: https://t.co/KSf2LsmMGT recommendation++
hackarcana.com
1
19
76
@0x10n
Xion
9 months
Sure, renderer exploits are fun, but have you tried adding hash collision constraints to it? https://t.co/EKRPLLuitX https://t.co/2nfJxfsEBz
2
19
175
@gynvael
Gynvael Coldwind
9 months
If you like CTF challenges, we've been steadily pushing some of my favorite tasks to my new edu site: https://t.co/AO3gLJSBep From top to bottom: Linux RE, 2x JS RE, USB PCAP, ZIP/crypto, DOS/VGA RE, 2x BMP image stegano, 5x BMP file format stegano, Python 2.7 RE, and ROP RE HFGL
2
23
149
@zeyu1337
zayne (zeyu) zhang
10 months
My slides from today's talk about Static Program Analysis. I go into how data flow analysis (like taint propagation in CodeQL) works from first principles - should be digestible with some first-year university maths knowledge https://t.co/lgvdS7BySo
0
34
160
@elma_ios
Elma
10 months
im a noob at hardware but i really enjoyed playing around with this hardware conference badge — cutting and poking random wires :) check out my writeup
Tweet card summary image
blog.elmo.sg
writeup on hardware badge from standcon 2025
1
3
33