Qrious Secure
@qriousec
Followers
2K
Following
3
Media
13
Statuses
28
Debugger is main vehicle to satisfy our boundless Qriousity. A non-profit π»π³ hackers' club driven by passion.
Joined November 2022
Kimi K2 thinking is truly impressive for an oss model, with it's assistant we developed fully firefox rce given 0x41414141 primitive in very short time.More importantly, the freedom without worrying it might leak 0day to closed source model vendor! This bug has been patched by
github.com
Contribute to qriousec/browsers development by creating an account on GitHub.
Our fuzzer generated entirely by Vibing just found it first ( confirmed! ) 0day in Firefox. CVE and details soon!
5
39
274
Unfortunately, Tri Dang (@trichimtrich) from Qrious Secure could not get his exploit of the Samsung Galaxy S25 in the time allotted. #Pwn2Own
1
1
25
We have another Success/Collision. Ho Xuan Ninh (@Xuanninh1412), Hoang Hai Long (@seadragnol) from Qrious Secure used 5 bugs to exploit the Phillips Hue Bridge, but only 3 were unique. They still earn $16,000 and 3.75 Master of Pwn points. #Pwn2Own
0
9
61
We have prepared 2 entries this year mobile pwn2own! Ho Xuan Ninh (@Xuanninh1412), Hoang Hai Long (@seadragnol) from Qrious Secure targeting Philips Hue Bridge in the Smart Home Tri Dang (@trichimtrich) from Qrious Secure targeting Samsung Galaxy S25 https://t.co/dZJDjXweZX
thezdi.com
Welcome to Pwn2Own Ireland 2025! We have some amazing spooky entries for this yearβs contest, and a potential of up to $2,000,000 - including our largest ever single prize for a 0-click in WhatsApp...
0
3
34
Our web3 audit agent keep getting smarter! Thanks for frontiers model π Time to teach it some Rustlang for bigger competition π
0
1
10
First crash of the year. Displaying a calculator is another story.
1
10
156
Our fuzzer generated entirely by Vibing just found it first ( confirmed! ) 0day in Firefox. CVE and details soon!
10
86
708
Check out our newest blog about how we took advantage of a WebGPU feature to turn an integer underflow bug into an arbitrary read in Chromeβs WebGPU. This bug was fixed by Google long ago, but our ticket is still restricted. https://t.co/vYvVPtF2PP by @lanleft_ + @__suto
qriousec.github.io
Introduction Back in the beginning of the year 2024, we started our project on ANGLE, it is a chromium graphic library, handling rendering stuff on chrome process. Fortunately, our team found some of...
2
34
156
Theses findings found by our AI Agent. Probably some writeup when more complex issue got destricted. https://t.co/ho0lrb9OEL
github.com
Contribute to qriousec/web3_finding development by creating an account on GitHub.
0
8
32
We have a full win!! Ho Xuan Ninh (@Xuanninh1412) and Tri Dang (@trichimtrich) from Qrious Secure used a 4 bug chain to exploit #NVIDIA Triton. Their unique work earns them $30,000 and 3 Master of Pwn points.
1
10
87
Fantastic! Ho Xuan Ninh (@Xuanninh1412) and Tri Dang (@trichimtrich) from Qrious Secure successfully demonstrated their exploit of #NVIDIA Triton. Will it be unique or another bug collision? They are off to the disclosure room to find out. #Pwn2Own #P2OBerlin
0
8
46
The hibernation of our Linux kernel team has ended. Our team member @SeaDragnoL has successfully pwned the COS 109 target of Google's kernelCTF!
2
1
87
0
30
141
A brief JavascriptCore RCE story by @lanleft_ and An Nguyα»
n https://t.co/mKJMcmVZGS
qriousec.github.io
Introduction The vulnerability introduced in commit 053d9a84 is a trivial uninitialized memory issue, easy to catch by simple unit tests. At the time of discovering the bug, we believed that this...
0
56
226
This is the report of the Windows LPE bug that I used in TyphoonPwn this year.
π¨ New advisory was just published! π¨ A vulnerability in the Common Log File System (CLFS) driver allows a local user to gain elevated privileges on Windows 11 https://t.co/oKESMRBJ5x
2
8
78
After CVE-2024-0223, we reported the bypass and it was assigned CVE-2024-3516: https://t.co/VVJz6lWJt8 Months later, someone else reported another variant and Google decided to give up and allow Chrome's GPU to crash instead of fixing the issue.
1
1
17