
Orange Tsai 🍊
@orange_8361
Followers
60K
Following
17K
Media
64
Statuses
1K
This is 🍊
台灣
Joined August 2010
Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! https://t.co/YzYcwxOGBn Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code
37
650
2K
Say hi to them — check out our latest research!
@hexacon_fr 2025 is here! This week (Oct 10–11), our researchers Xiaobye (@xiaobye_tw) and Pumpkin (@u1f383) hit the Paris stage with vulnerability research on MediaTek Wi-Fi and Linux io_uring. Big debut for our young talents at Hexacon! 🔥
0
8
104
Really love the style of this exploit chain! 👏
The watchTowr Labs team is back, providing our full analysis of the Oracle E-Business Suite Pre-Auth RCE exploit chain (CVE-2025-61882). Enjoy with us (or cry, your choice..) https://t.co/ffDKb723N6
3
16
240
MODERATOR: Are you willing to commit to NOT raise the sales tax? MIKIE SHERRILL: I'm not going to commit to anything right now. On Nov. 4, vote NO on Mikie Sherrill. ❌
11
39
123
yaaaaa! Long time no see!
Not only did I get the legendary @orange_8361 to sign my Phrack at @HacksInTaiwan, he also quoted me in his excellent talk on his CTF journey. It was very nostalgic and heartwarming to reminisce about CTFs from 10+ years ago! 🍊🥰
0
0
87
The #defcon hardcopy of @phrack is a thing of beauty! It embodies both technical depth & the hacker spirit (as usual). Reading @orange_8361's musings on CTF & his role as a bug archeologist was like recognizing an old friend. Thank you, Phrack staff, for making this treasure.
3
13
130
Brian says CFO. We say spokesperson. He says receipts. We say Ramp. RSVP to see who wins.
0
1
33
Didn’t get a Phrack zine at @defcon? Come to @HacksInTaiwan next week! We’re dropping 100 HITCON limited edition copies, with a chance to get @orange_8361 ’s autograph. 🍊Walk-in tickets available!
1
12
72
Thanks @PortSwigger and @BugBountyDEFCON for this awesome event — and also to my @d3vc0r3 buddies for standing on stage to collect the trophy for me! A little follow-up article on this research is coming soon... stay tuned! 🤘
12
32
461
This will be one of the few OSEE trainings held in Asia. Welcome to Taiwan :) https://t.co/7dTQH8RR4B
blog.orange.tw
✅:『課程結束後一年內要考到 OSEE 證照喔』🍊:「安啦,有一整年能準備哪不行」 (⏳⋯⋯) ✅:『公司下個月開始宣傳課程,到時候要有心得文唷』🍊:「好(默默打開 OffSec 網站排了死線前一天考試)」 (⏳⋯⋯) 🍊:「下禮拜就要考試了,怎麼會這樣 ヽ(゚Д゚≡゚Д゚)ノ 」✅:『你到底在幹嘛???』 這篇文算是自己準備 OSEE 考試的一點小心得,關於課程內容大家可以參考上一
4
32
267
A bit late, but I just published my blog post on bypassing Ubuntu’s sandbox! Hope you enjoy it! https://t.co/Q9Nra9n6N0
u1f383.github.io
5
114
389
I don't have OSCP—instead, I have OSEE! 🎉
55
65
2K
Thrilled to share our latest deep dive into Windows Kernel Streaming! Just presented this research at @offensive_con. Check it out:
devco.re
In-depth research into Windows Kernel Streaming vulnerabilities, revealing MDL misuse, buffer misalignment, and exploitation techniques used in CVE-2024-38238 and others.
1
82
285
Another day, another bug of mine got listed in CISA's KEV. Why does everyone love my bugs (sigh...)? BTW, great article by @SinSinology again!
Our client base has been feeding us rumours about in-the-wild exploited SonicWall SMA n-days (CVE-2023-44221, CVE-2024-38475) for a while... Given these are now CISA KEV, enjoy our now public analysis and reproduction :-) https://t.co/W3zR5YRifJ
4
26
285
Come join us at the Ask A Security Expert session at Black Hat Asia on April 4th! I'll be there with @orange_8361, @ryan_flores, and @Marmusha answering your cybersecurity questions. Submit your topics in advance using the form on the event page. Looking forward to seeing you!
2
5
40
The blog post is the full version of my talk at 38c3. It's about some vulnerabilities we found in libarchive and some interesting behaviors of libarchive that you don't want to miss. My favorite part is it only took us 56 seconds to trigger a crash by AFL++.
Our latest deep dive explores libarchive vulnerabilities under recent Windows 11 updates. 🔍🔓 Check out NiNi's (@terrynini38514) technical write-up for key insights and security implications. Read more here: https://t.co/MUb7koMIrw
#VulnerabilityResearch
#Cybersecurity
0
18
80