
Mickey Jin
@patch1t
Followers
5K
Following
3K
Media
36
Statuses
267
Exploring the world with my sword of debugger : )
Joined August 2013
As promised, I just dropped a dozen new sandbox escape vulnerabilities at #POC2024.If you missed the talk, here is the blog post:. Slides:. Enjoy and find your own bugs 😎.
Actually, 15+ new sandbox escape vulnerabilities discovered. All of them are simple logic issues. You may find your own sandbox 0-days by yourself after listening to this talk!🔥🔥🔥.
12
145
480
RT @dillon_franke: I lightly mentioned CVE-2025-31235, a double-free I found in coreaudiod/CoreAudio, during my OffensiveCon presentation l….
0
42
0
RT @08Tc3wBB: Woah, @WangTielei talk “Sending Me Your IOUserClients: A Bypass to Immovable Ports” at @deepsec_cc was insanely good! I enjoy….
0
8
0
RT @patrickwardle: Stoked for Jaron Bradley's soon to be released 2nd-book: "Threat Hunting macOS" 😍📚 (And was honored to write its forward….
0
9
0
RT @dillon_franke: Thrilled to announce my new Project Zero blog post is LIVE! 🎉 I detail my knowledge-driven fuzzing process to find sandb….
0
108
0
RT @ProjectZeroBugs: XNU VM_BEHAVIOR_ZERO_WIRED_PAGES behavior allows writing to read-only pages
0
22
0
RT @OligoSecurity: Oligo Security researchers uncovered critical vulnerabilities in Apple's AirPlay protocol, affecting billions of devices….
0
16
0
Exploit to escape the app sandbox:.1. Drop the exploit.aar from a sandboxed app.2. open exploit.aar (quarantined).3. open from $TMPDIR.4. open ~/Downloads/poc.app (not quarantined).(Step 3 is killed on the latest macOS, but should work on Sonoma).
I'm excited to announce a writeup for CVE-2024-27876, a fun libAppleArchive bug I discovered back in April last year! I've also supplied an exploit maker for making a malformed aar to write to an arbitrary file.
3
20
107
RT @ale_sp_brazil: Technical analysis of CVE-2025-31201: reverse engineering the diff between iOS 18.4 and 18.4.1 to study the changes made….
0
83
0
RT @deepsec_cc: [Official Announcement]: 2025 IS COMING!!!. This is a community-driven, non-profit information secu….
0
11
0
RT @patrickwardle: Apple will (finally!) bring TCC events to Endpoint Security in macOS 15.4 🥳. I've just posted "TCCing is Believing" whic….
0
52
0
RT @theevilbit: Apple says that the bounty for a vuln which has an LPE+Full TCC bypass impact is the same as a full TCC bypass alone, becau….
0
11
0
RT @alfiecg_dev: I've just published a new blog post detailing how I developed a deterministic kernel exploit for iOS. Enjoy!. https://t.co/….
0
148
0
RT @objective_see: Stoked to announce 'Objective by the Sea' v8.0! . the world's only dedicated 🍏-security conference!. #OBTS v8.0:.📍 Ibi….
0
29
0
RT @j_duffy01: 🚀 Technical Analysis! Just published my analysis of how a faulty GIF leads to a DoS condition in Apple’s iWork Suite on macO….
0
14
0