orange_8361 Profile Banner
Orange Tsai  🍊 Profile
Orange Tsai 🍊

@orange_8361

Followers
60K
Following
17K
Media
64
Statuses
1K

This is 🍊

台灣
Joined August 2010
Don't wanna be here? Send us removal request.
@orange_8361
Orange Tsai 🍊
1 year
Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! https://t.co/YzYcwxOGBn Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code
37
650
2K
@orange_8361
Orange Tsai 🍊
3 days
Say hi to them — check out our latest research!
@d3vc0r3
DEVCORE
3 days
@hexacon_fr 2025 is here! This week (Oct 10–11), our researchers Xiaobye (@xiaobye_tw) and Pumpkin (@u1f383) hit the Paris stage with vulnerability research on MediaTek Wi-Fi and Linux io_uring. Big debut for our young talents at Hexacon! 🔥
0
8
104
@orange_8361
Orange Tsai 🍊
4 days
Really love the style of this exploit chain! 👏
@watchtowrcyber
watchTowr
5 days
The watchTowr Labs team is back, providing our full analysis of the Oracle E-Business Suite Pre-Auth RCE exploit chain (CVE-2025-61882). Enjoy with us (or cry, your choice..) https://t.co/ffDKb723N6
3
16
240
@orange_8361
Orange Tsai 🍊
2 months
Turns out my #PHRACK article is live! 🔥 > The Art of PHP — My CTF Journey and Untold Stories! Kinda a love letter to those CTF players & PHP nerds! Hope all the credit goes to the right ppl. Also huge thanks to @0xdea for not forgetting me, @guitmz for the edits, and the
20
219
883
@Restore_NJ
Restore New Jersey
8 days
MODERATOR: Are you willing to commit to NOT raise the sales tax? MIKIE SHERRILL: I'm not going to commit to anything right now. On Nov. 4, vote NO on Mikie Sherrill. ❌
11
39
123
@orange_8361
Orange Tsai 🍊
2 months
yaaaaa! Long time no see!
@tylerni7
tylerni7
2 months
Not only did I get the legendary @orange_8361 to sign my Phrack at @HacksInTaiwan, he also quoted me in his excellent talk on his CTF journey. It was very nostalgic and heartwarming to reminisce about CTFs from 10+ years ago! 🍊🥰
0
0
87
@seeinglogic
Mark Griffin
2 months
The #defcon hardcopy of @phrack is a thing of beauty! It embodies both technical depth & the hacker spirit (as usual). Reading @orange_8361's musings on CTF & his role as a bug archeologist was like recognizing an old friend. Thank you, Phrack staff, for making this treasure.
3
13
130
@bl4sty
blasty
2 months
thanks for the mention, @orange_8361 :-)
1
1
38
@tryramp
Ramp
3 days
Brian says CFO. We say spokesperson. He says receipts. We say Ramp. RSVP to see who wins.
0
1
33
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
2 months
Didn’t get a Phrack zine at @defcon? Come to @HacksInTaiwan next week! We’re dropping 100 HITCON limited edition copies, with a chance to get @orange_8361 ’s autograph. 🍊Walk-in tickets available!
1
12
72
@orange_8361
Orange Tsai 🍊
2 months
Thanks @PortSwigger and @BugBountyDEFCON for this awesome event — and also to my @d3vc0r3 buddies for standing on stage to collect the trophy for me! A little follow-up article on this research is coming soon... stay tuned! 🤘
12
32
461
@orange_8361
Orange Tsai 🍊
2 months
Oh mom, I am in @phrack! #why2025
14
23
511
@u1f383
Pumpkin 🎃
4 months
A bit late, but I just published my blog post on bypassing Ubuntu’s sandbox! Hope you enjoy it! https://t.co/Q9Nra9n6N0
u1f383.github.io
5
114
389
@orange_8361
Orange Tsai 🍊
4 months
I don't have OSCP—instead, I have OSEE! 🎉
@orange_8361
Orange Tsai 🍊
1 year
My first kernel exploit! Big thanks to @d3vc0r3 and @offsectraining ! 🎉
55
65
2K
@scwuaptx
Angelboy
5 months
Thrilled to share our latest deep dive into Windows Kernel Streaming! Just presented this research at @offensive_con. Check it out:
Tweet card summary image
devco.re
In-depth research into Windows Kernel Streaming vulnerabilities, revealing MDL misuse, buffer misalignment, and exploitation techniques used in CVE-2024-38238 and others.
1
82
285
@orange_8361
Orange Tsai 🍊
5 months
Another day, another bug of mine got listed in CISA's KEV. Why does everyone love my bugs (sigh...)? BTW, great article by @SinSinology again!
@watchtowrcyber
watchTowr
5 months
Our client base has been feeding us rumours about in-the-wild exploited SonicWall SMA n-days (CVE-2023-44221, CVE-2024-38475) for a while... Given these are now CISA KEV, enjoy our now public analysis and reproduction :-) https://t.co/W3zR5YRifJ
4
26
285
@ashl3y_shen
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
7 months
Come join us at the Ask A Security Expert session at Black Hat Asia on April 4th! I'll be there with @orange_8361, @ryan_flores, and @Marmusha answering your cybersecurity questions. Submit your topics in advance using the form on the event page. Looking forward to seeing you!
2
5
40
@terrynini38514
NiNi
8 months
The blog post is the full version of my talk at 38c3. It's about some vulnerabilities we found in libarchive and some interesting behaviors of libarchive that you don't want to miss. My favorite part is it only took us 56 seconds to trigger a crash by AFL++.
@d3vc0r3
DEVCORE
8 months
Our latest deep dive explores libarchive vulnerabilities under recent Windows 11 updates. 🔍🔓 Check out NiNi's (@terrynini38514) technical write-up for key insights and security implications. Read more here: https://t.co/MUb7koMIrw #VulnerabilityResearch #Cybersecurity
0
18
80