Pikala Profile
Pikala

@p1k4l4

Followers
1K
Following
58
Media
6
Statuses
45

CEO @ZeroZenXlabs

Morocco
Joined April 2022
Don't wanna be here? Send us removal request.
@p1k4l4
Pikala
2 months
RT @zerozenxlabs: $100K for Linux LPE – CentOS, RHEL, AWS🚨 . We are currently seeking to acquire a Linux Local Privilege Escalation (LPE….
0
5
0
@p1k4l4
Pikala
5 months
RT @zerozenxlabs: 🔥 Exclusive Bounty: Serv-U 0-Day Wanted! 🔥. ZeroZenX is on the hunt for 0-day vulnerabilities affecting Serv-U! 💥 . If yo….
0
2
0
@p1k4l4
Pikala
9 months
RT @zerozenxlabs: 🔍 In-House Discovery Released: CVE-2023-7261 🔍. We’re excited to announce that Google has now fixed our reported vulner….
0
3
0
@p1k4l4
Pikala
9 months
RT @zerozenxlabs: We’re looking to acquire pre-auth RCE zero-days affecting:. - Palo Alto GlobalProtect.- Cisco VPN.- Citrix.- ColdFusion.-….
0
5
0
@p1k4l4
Pikala
1 year
RT @0xor0ne: Beginners introduction to Linux kernel exploitation . Debugging with QEMU: Stack Overflows: https://t.….
0
113
0
@p1k4l4
Pikala
1 year
RT @zerozenxlabs: We're Hiring: Kernel Vulnerability Researcher!. Are you passionate about cybersecurity and have a knack for uncovering….
0
1
0
@p1k4l4
Pikala
1 year
RT @zerozenxlabs: Do you have a 0day to sell? 💰 .Explore our bounties and discover the true worth of your findings. Join our community of….
0
1
0
@p1k4l4
Pikala
1 year
I just released the exploit and technical analysis of my CVE-2023-36424 - Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation. Happy Reading. #exploit #cybersecurity #news
9
108
407
@p1k4l4
Pikala
2 years
I'm excited to announce that the technical analysis and the exploit of my CVE-2023-6546 (ZDI-24-020) .Linux Kernel GSM Multiplexing Race Condition LPE is now available on : . Happy Reading. #Cybersecurity #Vulnerability #CVE #InfoSec #exploit #Security.
Tweet card summary image
github.com
Contribute to zerozenxlabs/ZDI-24-020 development by creating an account on GitHub.
5
101
349
@p1k4l4
Pikala
2 years
RT @zerozenxlabs: Do you have a 0day ? You want to sell it and get big payouts ?. Submit your finding to : submit@zerozenx.com. Visit us :….
0
1
0
@p1k4l4
Pikala
2 years
New 0day discovered. It was a long weeks and challenged days, but it deserves. EntroLink VPN Appliances - Preauth RCE. According to Fofa there are 44k affected targets. #0day #CyberSecurity #CybersecurityNews #exploit
Tweet media one
13
42
263
@p1k4l4
Pikala
2 years
RT @DebugPrivilege: Microsoft DART is currently looking to hire a manager in Europe! You will work in a fast-paced, intellectually intense,….
0
34
0
@p1k4l4
Pikala
2 years
Finally, Hunting #0day on Windows leads to discover a DACL Overwrite vulnerability #0day. The 0day affect :. Windows 10 x64 1903 (18362.356) (September 2019) - Windows 10 22H2 (19045.3516).Windows 11 x64 (all builds) including the latest 21H2 (22000.2482) and 22H2 (22621.2361)
Tweet media one
2
29
165
@p1k4l4
Pikala
2 years
RT @H_Miser: #CyberMois Vous connaissez tous VirusTotal ? cette plateforme qui permet de faire analyser un fichier à un grand nombre de mot….
0
116
0
@p1k4l4
Pikala
2 years
oh shit, here we go again. #Windows LPE (0day). Affected Targets:. Windows 10 / Windows 11 / Windows Servers (2012 - 2016 - 2019 - 2022). #0day #exploit #windows #cybersecurity
Tweet media one
4
15
107
@p1k4l4
Pikala
2 years
Here a stable exploit for my #0day that affect #Arris VAP2500 you can find the exploit and #shodan dorks on github.
Tweet card summary image
github.com
Arris VAP2500 PreAuth RCE exploit. Contribute to zerozenxlabs/ArrisVAP2500-Exploit development by creating an account on GitHub.
0
8
30
@p1k4l4
Pikala
2 years
RT @h4x0r_dz: HackerOne Live Hacking Event invites is based on your Good contacts not your profile/skills, unfortunately .#BugBounty.
0
2
0
@p1k4l4
Pikala
2 years
I'm thrilled to announce that ive discovered TWO critical 0days (Linux LPE / Windows LPE) . I would like to thank @thezdi for the acquisition of these items. Stay tuned for in-depht Technical Analysis once patches are out. Reach me on Linkedin too: .
Tweet media one
6
9
102
@p1k4l4
Pikala
2 years
RT @0xor0ne: A lot of things to learn in this series by greenluigi1 on car Infotainment system hacking. Part 1: .Pa….
0
100
0
@p1k4l4
Pikala
3 years
RT @0xor0ne: Very cool writeup on CoRJail challenge (corCTF 2022).Docker escape through Linux kernel exploitation. .
0
68
0