patch1t Profile Banner
Mickey Jin Profile
Mickey Jin

@patch1t

Followers
5K
Following
3K
Media
36
Statuses
267

Exploring the world with my sword of debugger : )

Joined August 2013
Don't wanna be here? Send us removal request.
@patch1t
Mickey Jin
8 months
As promised, I just dropped a dozen new sandbox escape vulnerabilities at #POC2024.If you missed the talk, here is the blog post:. Slides:. Enjoy and find your own bugs 😎.
@patch1t
Mickey Jin
10 months
Actually, 15+ new sandbox escape vulnerabilities discovered. All of them are simple logic issues. You may find your own sandbox 0-days by yourself after listening to this talk!🔥🔥🔥.
12
145
480
@patch1t
Mickey Jin
11 days
RT @dillon_franke: I lightly mentioned CVE-2025-31235, a double-free I found in coreaudiod/CoreAudio, during my OffensiveCon presentation l….
0
42
0
@patch1t
Mickey Jin
16 days
RT @theevilbit: My "Finding Vulnerabilities in Apple Packages at Scale" talk is up on YT 🎉.
0
10
0
@patch1t
Mickey Jin
18 days
RT @08Tc3wBB: Woah, @WangTielei talk “Sending Me Your IOUserClients: A Bypass to Immovable Ports” at @deepsec_cc was insanely good! I enjoy….
0
8
0
@patch1t
Mickey Jin
1 month
RT @patrickwardle: Stoked for Jaron Bradley's soon to be released 2nd-book: "Threat Hunting macOS" 😍📚 (And was honored to write its forward….
0
9
0
@patch1t
Mickey Jin
1 month
RT @dfsec_com: Our new blog post is live:
0
79
0
@patch1t
Mickey Jin
2 months
RT @ifsecure: The slides for my OffensiveCon talk "Finding and Exploiting 20-year-old bugs in Web Browsers"
0
120
0
@patch1t
Mickey Jin
2 months
RT @dillon_franke: Thrilled to announce my new Project Zero blog post is LIVE! 🎉 I detail my knowledge-driven fuzzing process to find sandb….
0
108
0
@patch1t
Mickey Jin
2 months
RT @ProjectZeroBugs: XNU VM_BEHAVIOR_ZERO_WIRED_PAGES behavior allows writing to read-only pages
0
22
0
@patch1t
Mickey Jin
2 months
RT @OligoSecurity: Oligo Security researchers uncovered critical vulnerabilities in Apple's AirPlay protocol, affecting billions of devices….
0
16
0
@patch1t
Mickey Jin
3 months
Exploit to escape the app sandbox:.1. Drop the exploit.aar from a sandboxed app.2. open exploit.aar (quarantined).3. open from $TMPDIR.4. open ~/Downloads/poc.app (not quarantined).(Step 3 is killed on the latest macOS, but should work on Sonoma).
@0xilis
Snoolie🎱 (@snoolie.gay on bsky)
3 months
I'm excited to announce a writeup for CVE-2024-27876, a fun libAppleArchive bug I discovered back in April last year! I've also supplied an exploit maker for making a malformed aar to write to an arbitrary file.
3
20
107
@patch1t
Mickey Jin
3 months
RT @ale_sp_brazil: Technical analysis of CVE-2025-31201: reverse engineering the diff between iOS 18.4 and 18.4.1 to study the changes made….
0
83
0
@patch1t
Mickey Jin
3 months
RT @deepsec_cc: [Official Announcement]: 2025 IS COMING!!!. This is a community-driven, non-profit information secu….
0
11
0
@patch1t
Mickey Jin
3 months
I got 14 new Apple CVEs in this release😎
Tweet media one
@ApplSec
ApplSec
3 months
🐛 NEW SECURITY CONTENT 🐛. 💻 macOS Sequoia 15.4 - 131 bugs fixed.💻 macOS Sonoma 14.7.5 - 91 bugs fixed.💻 macOS Ventura 13.7.5 - 85 bugs fixed.📱 iOS and iPadOS 18.4 - 62 bugs fixed.🥽 visionOS 2.4 - 38 bugs fixed.📱 iPadOS 17.7.6 - 38 bugs fixed.
18
40
668
@patch1t
Mickey Jin
3 months
RT @patrickwardle: Apple will (finally!) bring TCC events to Endpoint Security in macOS 15.4 🥳. I've just posted "TCCing is Believing" whic….
0
52
0
@patch1t
Mickey Jin
3 months
RT @i41nbeer: My writeup of the 2023 NSO in-the-wild iOS zero-click BLASTDOOR webp exploit: Blasting Past Webp -.
0
234
0
@patch1t
Mickey Jin
4 months
RT @wtsdev: It's here. My write-up for CVE-2024-54471. Enjoy :).
0
30
0
@patch1t
Mickey Jin
4 months
RT @theevilbit: Apple says that the bounty for a vuln which has an LPE+Full TCC bypass impact is the same as a full TCC bypass alone, becau….
0
11
0
@patch1t
Mickey Jin
4 months
RT @alfiecg_dev: I've just published a new blog post detailing how I developed a deterministic kernel exploit for iOS. Enjoy!. https://t.co/….
0
148
0
@patch1t
Mickey Jin
4 months
RT @objective_see: Stoked to announce 'Objective by the Sea' v8.0! . the world's only dedicated 🍏-security conference!. #OBTS v8.0:.📍 Ibi….
0
29
0
@patch1t
Mickey Jin
4 months
RT @j_duffy01: 🚀 Technical Analysis! Just published my analysis of how a faulty GIF leads to a DoS condition in Apple’s iWork Suite on macO….
0
14
0