
Boris Larin
@oct0xor
Followers
18K
Following
8K
Media
86
Statuses
774
Former console hacker (PS3/PS4). Hunting in the wild 0-days at Kaspersky GReAT. All tweets are my own.
Joined August 2011
Kept you waiting, huh? Its the 20th anniversary of Metal Gear Solid 2: Substance, and as promised, here's a mod that lets you play it with the 3rd person camera from Metal Gear Solid 3: Subsistence!
github.com
This mod lets you play MGS2: Substance with the 3rd person camera (and game controls) from MGS3: Subsistence - oct0xor/mgs2sos
46
305
1K
I am out from the exploitation world since 8 years ago now, but https://t.co/cb9WAD5gmL is a very nice reading. Well done @carrot_c4k3 ! Kudos!
1
20
113
🛫 This is your last reminder to hurry and join the #CFP for #TheSAS2025 before it closes! The program committee is gearing up for debates! This year’s panel includes #TheSAS2024’s best speaker and renowned APT zero-day hunter Boris Larin (@oct0xor). He’ll definitely champion
0
2
10
#CFP extended — your last chance to rock the floor at #TheSAS2025! Just 10 days left to propose your research for the BIG stage and share your findings with peers from world-class cybersecurity organizations. If you research: ▪️ Transportation and smart city vulnerabilities ▪️
0
13
18
TheSAScon is one of the best conferences I've ever attended and now is a great time to submit your research while CFP is still open!
🎥 What did last year’s Security Analyst Summit feel like? Hear it from the people who were there. This year, #TheSAS2025 returns to Khao Lak, Thailand, from October 26–29. Get ready for real-world threat intel, open conversations, and a chance to connect with the brightest
0
0
6
Encountered this situation many times this year. As the disrespect for research continues, fewer and fewer reseacher will cooperate with MSRC(Microsoft) in the future.
15
14
75
Check out our analysis of the SharePoint ToolShell vulnerabilities: how the ITW exploit works, how it was patched, and why the initial patches could be easily bypassed
securelist.com
Explaining the ToolShell vulnerabilities in SharePoint: how the POST request exploit works, why initial patches can be easily bypassed, and how to stay protected.
0
30
87
Really enjoyed @typhooncon keynote of Andy @theflow0 about his journey of hacking gaming consoles. One of the best and most inspiring talks on bug hunting I have ever seen!
7
17
151
🚨 Less than 10 days until the SAS CTF 2025 Quals kick off! 🚨 Register your team now and claim the spot in the top 8 to compete for a share of the $18,000 prize pot at the on-site finals at the SAS conference in Thailand. Register: https://t.co/8ctDh4CC5W
0
14
24
My talk about the recent SMM architecture and security at @TheSAScon : https://t.co/DkwU5eEZOC The conference was well organized and had plenty of networking opportunities. Though, the best thing was the venue :) It is at a beautiful resort again this year, so you will love it.
0
30
120
🌪️ TyphoonCon 2025: Full Speaker Lineup Revealed! We're thrilled to announce our complete speaker assembly for TyphoonCon 2025 This year's lineup represents our most diverse and technically impressive collection of offensive security talent yet. From cutting-edge hardware
1
10
73
I'm really happy to announce that we've just opened registration for the SAS CTF 2025 qualifying round!⛳️ This year's top 8 teams will qualify for the onsite finals to compete for a share of the $18.000 prize pool at the Security Analyst Summit conference in Khao Lak, Thailand
0
13
28
🎉 It’s official – #SAS2025 is coming! The world’s GReATest cybersecurity event returns with cutting-edge research, mind-blowing hacks, and the ultimate CTF finale. You won't want to miss this, book your place now: https://t.co/JWVeccqyVH
0
14
31
Someone pointed out that MITRE is letting go of 400+ employees, which is definitely a big number. But with ~9,000 employees total, that’s still less than 5%. To me, that doesn’t explain why the CVE team had to be part of the cut. It’s probably a small group, maybe 5–10 people.
5
12
63
mozilla.org
0
2
8
The root cause of the Chrome 0-day vulnerability CVE-2025-2783, which we discovered used in attacks with sophisticated malware, also affects the Firefox! New CVE-2025-2857 has just been fixed in Firefox 136.0.4, and you can read about what led to its discovery at the link below.
1
23
119
We (me + @2igosha) have discovered a new Google Chrome 0-day that is being used in targeted attacks to deliver sophisticated spyware 🔥🔥🔥. It was just fixed as CVE-2025-2783 and we are revealing the first details about it and “Operation ForumTroll”
securelist.com
Kaspersky GReAT experts discovered a complex APT attack on Russian organizations dubbed Operation ForumTroll, which exploits zero-day vulnerabilities in Google Chrome.
9
101
280
We're delighted to welcome @oct0xor to the #TyphoonCon2025 lineup! 🎤 Join us in Seoul on May 29-30! 🔗 https://t.co/NLimevQFMF
0
7
31
You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials.
bughunters.google.com
This blog post covers the full details of EntrySign, the AMD Zen microcode signature validation vulnerability recently discovered by the Google Security team.
39
529
2K