Boris Larin Profile
Boris Larin

@oct0xor

Followers
18K
Following
8K
Media
86
Statuses
774

Former console hacker (PS3/PS4). Hunting in the wild 0-days at Kaspersky GReAT. All tweets are my own.

Joined August 2011
Don't wanna be here? Send us removal request.
@oct0xor
Boris Larin
3 years
Kept you waiting, huh? Its the 20th anniversary of Metal Gear Solid 2: Substance, and as promised, here's a mod that lets you play it with the 3rd person camera from Metal Gear Solid 3: Subsistence!
Tweet card summary image
github.com
This mod lets you play MGS2: Substance with the 3rd person camera (and game controls) from MGS3: Subsistence - oct0xor/mgs2sos
46
305
1K
@aall86
Andrea Allievi
22 days
I am out from the exploitation world since 8 years ago now, but https://t.co/cb9WAD5gmL is a very nice reading. Well done @carrot_c4k3 ! Kudos!
1
20
113
@TheSAScon
TheSAS2025
1 month
🛫 This is your last reminder to hurry and join the #CFP for #TheSAS2025 before it closes! The program committee is gearing up for debates! This year’s panel includes #TheSAS2024’s best speaker and renowned APT zero-day hunter Boris Larin (@oct0xor). He’ll definitely champion
Tweet media one
0
2
10
@TheSAScon
TheSAS2025
1 month
#CFP extended — your last chance to rock the floor at #TheSAS2025! Just 10 days left to propose your research for the BIG stage and share your findings with peers from world-class cybersecurity organizations. If you research: ▪️ Transportation and smart city vulnerabilities ▪️
0
13
18
@oct0xor
Boris Larin
1 month
TheSAScon is one of the best conferences I've ever attended and now is a great time to submit your research while CFP is still open!
@TheSAScon
TheSAS2025
1 month
🎥 What did last year’s Security Analyst Summit feel like? Hear it from the people who were there. This year, #TheSAS2025 returns to Khao Lak, Thailand, from October 26–29. Get ready for real-world threat intel, open conversations, and a chance to connect with the brightest
0
0
6
@edwardzpeng
zhiniang peng
1 month
Encountered this situation many times this year. As the disrespect for research continues, fewer and fewer reseacher will cooperate with MSRC(Microsoft) in the future.
@edwardzpeng
zhiniang peng
1 month
Microsoft Security Response Center -> MSRC -> Merge SRC😠
Tweet media one
15
14
75
@oct0xor
Boris Larin
2 months
Check out our analysis of the SharePoint ToolShell vulnerabilities: how the ITW exploit works, how it was patched, and why the initial patches could be easily bypassed
Tweet card summary image
securelist.com
Explaining the ToolShell vulnerabilities in SharePoint: how the POST request exploit works, why initial patches can be easily bypassed, and how to stay protected.
0
30
87
@oct0xor
Boris Larin
3 months
Really enjoyed @typhooncon keynote of Andy @theflow0 about his journey of hacking gaming consoles. One of the best and most inspiring talks on bug hunting I have ever seen!
Tweet media one
7
17
151
@bzvr_
Leonid Bezvershenko
4 months
🚨 Less than 10 days until the SAS CTF 2025 Quals kick off! 🚨 Register your team now and claim the spot in the top 8 to compete for a share of the $18,000 prize pot at the on-site finals at the SAS conference in Thailand. Register: https://t.co/8ctDh4CC5W
Tweet media one
0
14
24
@standa_t
Satoshi Tanda
4 months
My talk about the recent SMM architecture and security at @TheSAScon : https://t.co/DkwU5eEZOC The conference was well organized and had plenty of networking opportunities. Though, the best thing was the venue :) It is at a beautiful resort again this year, so you will love it.
0
30
120
@typhooncon
TyphoonCon🌪️
5 months
🌪️ TyphoonCon 2025: Full Speaker Lineup Revealed! We're thrilled to announce our complete speaker assembly for TyphoonCon 2025 This year's lineup represents our most diverse and technically impressive collection of offensive security talent yet. From cutting-edge hardware
Tweet media one
1
10
73
@bzvr_
Leonid Bezvershenko
5 months
I'm really happy to announce that we've just opened registration for the SAS CTF 2025 qualifying round!⛳️ This year's top 8 teams will qualify for the onsite finals to compete for a share of the $18.000 prize pool at the Security Analyst Summit conference in Khao Lak, Thailand
Tweet media one
0
13
28
@TheSAScon
TheSAS2025
5 months
🎉 It’s official – #SAS2025 is coming! The world’s GReATest cybersecurity event returns with cutting-edge research, mind-blowing hacks, and the ultimate CTF finale. You won't want to miss this, book your place now: https://t.co/JWVeccqyVH
Tweet media one
0
14
31
@cyb3rops
Florian Roth ⚡️
5 months
Someone pointed out that MITRE is letting go of 400+ employees, which is definitely a big number. But with ~9,000 employees total, that’s still less than 5%. To me, that doesn’t explain why the CVE team had to be part of the cut. It’s probably a small group, maybe 5–10 people.
5
12
63
@WebDesignMuseum
Web Design Museum
5 months
Nintendo website in 2001 #WebDesignHistory
Tweet media one
49
701
5K
@oct0xor
Boris Larin
6 months
The root cause of the Chrome 0-day vulnerability CVE-2025-2783, which we discovered used in attacks with sophisticated malware, also affects the Firefox! New CVE-2025-2857 has just been fixed in Firefox 136.0.4, and you can read about what led to its discovery at the link below.
Tweet media one
1
23
119
@oct0xor
Boris Larin
6 months
We (me + @2igosha) have discovered a new Google Chrome 0-day that is being used in targeted attacks to deliver sophisticated spyware 🔥🔥🔥. It was just fixed as CVE-2025-2783 and we are revealing the first details about it and “Operation ForumTroll”
Tweet card summary image
securelist.com
Kaspersky GReAT experts discovered a complex APT attack on Russian organizations dubbed Operation ForumTroll, which exploits zero-day vulnerabilities in Google Chrome.
9
101
280
@typhooncon
TyphoonCon🌪️
6 months
We're delighted to welcome @oct0xor to the #TyphoonCon2025 lineup! 🎤 Join us in Seoul on May 29-30! 🔗 https://t.co/NLimevQFMF
Tweet media one
0
7
31
@taviso
Tavis Ormandy
6 months
You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials.
Tweet card summary image
bughunters.google.com
This blog post covers the full details of EntrySign, the AMD Zen microcode signature validation vulnerability recently discovered by the Google Security team.
39
529
2K