pwnfl4k3s Profile Banner
pwnfl4k3s Profile
pwnfl4k3s

@pwnfl4k3s

Followers
822
Following
1K
Media
2
Statuses
151

Opcode Kiddy a.k.a. [email protected]

Joined August 2014
Don't wanna be here? Send us removal request.
@Insinuator
Insinuator
6 years
New blog post: CVE-2020-0022 an Android 8.0-9.0 Bluetooth Zero-Click RCE – BlueFrag
4
256
460
@FSecureLabs
WithSecure Labs
6 years
You gotta be kidding Mi - We just published the Xiaomi Pwn2Own 2018 advisories, which were patched just before Pwn2Own 2019, for silent APK install in the Browser and WiFi categories by @munmap https://t.co/Ku2K5EmEdO and
0
33
84
@FSecureLabs
WithSecure Labs
6 years
Two security researchers went on a web app test and you won't believe what overflowed next: check out our new blog post "Prince of the Honeycomb" by @pwnfl4k3s
4
22
43
@thezdi
Trend Zero Day Initiative
6 years
Confirmed! The @FSecureLabs crew used an #XSS bug in the NFC component of the #Xiaomi Mi9 to exfiltrate data just by touching their specially made NFC tag. Their efforts earned $30,000 and 3 more Master of Pwn points. #P2OTokyo
0
44
101
@NerdKernel
James Loureiro
6 years
The @mwrlabs team demonstrated 9 bugs in our inaugural internal pwn2own - showing remote and local bugs in IoT devices and routers. Awesome stuff ☺️
0
7
37
@FSecureLabs
WithSecure Labs
6 years
Ever wanted to hack a car? Break out of a hypervisor? Get over the air remote code execution on a baseband? MWR is looking for an offensive security researcher. https://t.co/7xgfo8gaLI #0day #pwn2own
0
20
35
@theflow0
Andy Nguyen
6 years
I have finally published a write-up of the Trinity exploit chain consisting of three stages and six different vulnerabilities! https://t.co/TAUL31rWqt
56
323
1K
@_niklasb
Niklas B
6 years
I wrote a thing about my macOS sandbox escape & LPE from Pwn2Own
4
221
513
@5aelo
Samuel Groß
7 years
Fuzzilli, my JavaScript engine fuzzer, is now open source: https://t.co/2noeJIATVf \o/ Keep an eye on the Project Zero bugtracker in the next few weeks for some of the bugs found with it. Also let me know if you encounter any problems when using it! :)
Tweet card summary image
github.com
A JavaScript Engine Fuzzer. Contribute to googleprojectzero/fuzzilli development by creating an account on GitHub.
9
433
984
@FSecureLabs
WithSecure Labs
7 years
Jumping on the DHCP bandwagon:
2
96
171
@herdom
Dominik Herrmann
7 years
Join us in Bamberg to discuss about Ethics, IT Security, and Privacy (March 25–26). 13 speakers, 7 sessions, full program and registration (extended until March 11) at https://t.co/gN3XqCONjK
0
3
4
@benhawkes
Ben Hawkes
7 years
Project Zero blog: "The Curious Case of Convexity Confusion" by Ivan Fratric (@ifsecure) -
0
91
229
@__x86
Jeremy Fetiveau
7 years
Here is my exploit for one of @_tsuro 's TurboFan bugs related to an incorrect typing of String.(last)IndexOf JSCall nodes. https://t.co/WkRgIyGvis
Tweet card summary image
github.com
Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf - JeremyFetiveau/TurboFan-exploit-for-issue-762874
0
56
165
@flx1101
Felix
7 years
New blog post published :) https://t.co/GBq58KUumN
0
16
36
@FSecureLabs
WithSecure Labs
7 years
Did you recently think what the fuzz is this fuzzing everyone's talking about? Here's a thorough introduction to fuzzing by @flx1101
1
70
139
@moyix
Brendan Dolan-Gavitt
7 years
It looks like the code for Neuzz, a very cool new approach to fuzzing that uses deep neural networks to predict the coverage map for an input and then uses its gradients to focus fuzzing effort, has been released!
github.com
neural network assisted fuzzer. Contribute to Dongdongshe/neuzz development by creating an account on GitHub.
1
52
133
@anbiondo
Andrea Biondo
7 years
Full writeup on exploiting @_tsuro's Math.expm1 typing bug in V8, from analysis of the bug to RCE. Definitely one of the most difficult bugs I've ever worked on. Enjoy!
abiondo.me
Minus zero behaves like zero, right?
4
179
432
@munmap
G. Geshev
7 years
Thanks, @WanderingGlitch! This is, undoubtedly, one of my all-time favourites. The exploit was quite an exciting one to pull off as well. 🐞
@thezdi
Trend Zero Day Initiative
7 years
In the 4th of our Top 5 bugs of 2018, @WanderingGlitch details another #Pwn2Own winner. This one exploits the #macOS Dock and was part of @mwrlabs's winning #Safari entry.
0
3
11
@offensive_con
offensivecon
7 years
FuzzIL: Guided Fuzzing for JavaScript Engines by @5aelo
0
58
160