pamoutaf Profile
pamoutaf

@pamoutaf

Followers
258
Following
441
Media
6
Statuses
96

On an educational sabbatical. Host of chITchat by pamoutaf, you can listen on most platforms. If you wanna support the show, I set up a link in my linktree

Joined May 2025
Don't wanna be here? Send us removal request.
@vector35
Vector 35
3 days
Back-to-back-to-back streams! Join us again today at 4pm ET to meet Marion Marschalek, and get a taste of what Advanced Linux Malware Reverse Engineering at RE//verse 2026 will be like! Ask your questions during the stream or reply with them here! https://t.co/klHRciFJJg
0
5
27
@RockstarGames
Rockstar Games
4 days
Hi everyone, Grand Theft Auto VI will now release on Thursday, November 19, 2026. We are sorry for adding additional time to what we realize has been a long wait, but these extra months will allow us to finish the game with the level of polish you have come to expect and
71K
75K
548K
@pamoutaf
pamoutaf
5 days
Some good research going on here!
@XploitBengineer
Ben
6 days
I posted a short blog about how a Samsung GPU vulnerability (CVE-2025-21479) can be leveraged for an LPE on affected devices https://t.co/9tya9c37Ez
0
0
12
I posted a short blog about how a Samsung GPU vulnerability (CVE-2025-21479) can be leveraged for an LPE on affected devices https://t.co/9tya9c37Ez
xploitbengineer.github.io
Motivation A couple of years ago, I picked up a few of Samsung S23’s at Pwn2Own.
5
75
241
@__sethJenkins
Seth Jenkins
7 days
We really should be talking about this more....KASLR is just not working properly on Android right now, and it hasn't for a long time. https://t.co/AE0vBXEcob
6
57
189
@pinkflawd
Mari0n
16 days
Y'all fantastic news! Save the date, @Blackhoodie_RE will be at @DistrictCon this year 😱 the fantastic crew has offered to host us for a day of Malware Reverse Engineering, Morgan Whitlow and myself will be hosting a training for women by women on January 23rd!!
1
9
24
@thezdi
Trend Zero Day Initiative
17 days
What was bug if the day for #Pwn2Own Ireland day 3? Check it out
0
4
17
@munmap
G. Geshev
17 days
Mildly pimped-up demo of our #Pwn2Own exploit shown on a Galaxy S23. Mind the hysterical memes-to-0day ratio πŸ˜… Props to @thezdi for putting up with us and to all the hackers who made it a blast.
3
10
74
@XploitBengineer
Ben
18 days
We did a thing!
@thezdi
Trend Zero Day Initiative
18 days
Another big confirmation! Ben R. And Georgi G. of Interrupt Labs used an improper input validation bug to take over the Samsung Galaxy S25 - enabling the camera and location tracking in the process. They earn $50,000 and 5 Master of Pwn points. #Pwn2Own
8
5
85
@thezdi
Trend Zero Day Initiative
18 days
Another big confirmation! Ben R. And Georgi G. of Interrupt Labs used an improper input validation bug to take over the Samsung Galaxy S25 - enabling the camera and location tracking in the process. They earn $50,000 and 5 Master of Pwn points. #Pwn2Own
3
12
112
@pamoutaf
pamoutaf
18 days
Congrats !!! πŸ₯³πŸ₯³πŸ₯³
@thezdi
Trend Zero Day Initiative
18 days
Bang! Interrupt Labs successfully took over the #Samsung Galaxy 25 with 1 click. They remotely enabled the camera and location services, which has some frightening privacy implications. They head off to the disclosure room to explain how it works. #Pwn2Own
0
0
4
@thezdi
Trend Zero Day Initiative
18 days
Bang! Interrupt Labs successfully took over the #Samsung Galaxy 25 with 1 click. They remotely enabled the camera and location services, which has some frightening privacy implications. They head off to the disclosure room to explain how it works. #Pwn2Own
1
9
45
@thezdi
Trend Zero Day Initiative
18 days
Live from Pwn2Own Ireland: Interrupt Labs vs. Samsung Galaxy
0
5
12
@pamoutaf
pamoutaf
18 days
Let’s go !
@thezdi
Trend Zero Day Initiative
18 days
Just 20 more minutes until our third and final attempt targeting the #Samsung Galaxy S25 during #Pwn2Own Ireland. What it live here or on YouTube at
0
0
2
@corg_e
corgi
19 days
even Asimov couldn't predict my Dad texting me his car keys
0
1
30
@thezdi
Trend Zero Day Initiative
20 days
Whew! He took nearly all 30 minutes to make it happen, but @SinSinology successfully exploited the Synology DS925+. He heads off to the disclosure room to explain what took so long. #Pwn2Own #P2OIreland
3
12
113
@x71n3
christine πŸŒΈπŸ’πŸŒΊπŸŒ·πŸŒΉπŸͺ»πŸƒπŸŒ±πŸŒΏπŸͺ΄βœ¨
21 days
@pedrib1337 I know some queens πŸ‘‘
0
1
6
@pamoutaf
pamoutaf
21 days
Part of my educational sabbatical is to keep a record of things I learn each week (trying to be consistent but we shall see how it goes). I’m open to constructive feedback 😁 https://t.co/WpjxkcYdec
Tweet card summary image
p0pcycle.com
This is something I always found voodoo, figuring out how to recognize structures in decompiled binary code. Table of contents IntroductionInspecting the inflatePrime() functionRecognizable struct …
0
0
3
@samwcyo
Sam Curry
27 days
Earlier this year, @infosec_au and I discovered multiple vulnerabilities that allowed us to access the back office admin panel of ClubWPT Gold (the World Poker Tour's website) where we could manage customer data, KYC, and more. Read the writeup here: https://t.co/K2402UPWYk
Tweet card summary image
samcurry.net
In June, 2025, Shubs Shah and I discovered a vulnerability in the online poker website ClubWPT Gold which would have allowed an attacker to fully access the core back office application that is used...
21
97
385
@iBSparkes
sparkey
26 days
Our newest @dfsec_com blog post is live, thanks to @tomitokics from @df_forensics for putting this together :-) https://t.co/JoJfTOOXzV
blog.dfsec.com
Dataflow Security blog
0
37
155