Qrious Secure Profile
Qrious Secure

@qriousec

Followers
2K
Following
3
Media
13
Statuses
28

Debugger is main vehicle to satisfy our boundless Qriousity. A non-profit πŸ‡»πŸ‡³ hackers' club driven by passion.

Joined November 2022
Don't wanna be here? Send us removal request.
@__suto
Toan Pham
3 days
Kimi K2 thinking is truly impressive for an oss model, with it's assistant we developed fully firefox rce given 0x41414141 primitive in very short time.More importantly, the freedom without worrying it might leak 0day to closed source model vendor! This bug has been patched by
Tweet card summary image
github.com
Contribute to qriousec/browsers development by creating an account on GitHub.
@qriousec
Qrious Secure
1 month
Our fuzzer generated entirely by Vibing just found it first ( confirmed! ) 0day in Firefox. CVE and details soon!
5
39
274
@qriousec
Qrious Secure
7 days
Double Kill πŸ€ͺ Mozilla team working on the patch, we developing the exploit, no drama needed 😎
@qriousec
Qrious Secure
1 month
Our fuzzer generated entirely by Vibing just found it first ( confirmed! ) 0day in Firefox. CVE and details soon!
1
8
132
@thezdi
Trend Zero Day Initiative
20 days
Unfortunately, Tri Dang (@trichimtrich) from Qrious Secure could not get his exploit of the Samsung Galaxy S25 in the time allotted. #Pwn2Own
1
1
25
@thezdi
Trend Zero Day Initiative
21 days
We have another Success/Collision. Ho Xuan Ninh (@Xuanninh1412), Hoang Hai Long (@seadragnol) from Qrious Secure used 5 bugs to exploit the Phillips Hue Bridge, but only 3 were unique. They still earn $16,000 and 3.75 Master of Pwn points. #Pwn2Own
0
9
61
@qriousec
Qrious Secure
22 days
We have prepared 2 entries this year mobile pwn2own! Ho Xuan Ninh (@Xuanninh1412), Hoang Hai Long (@seadragnol) from Qrious Secure targeting Philips Hue Bridge in the Smart Home Tri Dang (@trichimtrich) from Qrious Secure targeting Samsung Galaxy S25 https://t.co/dZJDjXweZX
Tweet card summary image
thezdi.com
Welcome to Pwn2Own Ireland 2025! We have some amazing spooky entries for this year’s contest, and a potential of up to $2,000,000 - including our largest ever single prize for a 0-click in WhatsApp...
0
3
34
@qriousec
Qrious Secure
23 days
Our web3 audit agent keep getting smarter! Thanks for frontiers model πŸ™ Time to teach it some Rustlang for bigger competition 😎
0
1
10
@bienpnn
Bien πŸ‡»πŸ‡³
1 month
First crash of the year. Displaying a calculator is another story.
1
10
156
@qriousec
Qrious Secure
1 month
Our fuzzer generated entirely by Vibing just found it first ( confirmed! ) 0day in Firefox. CVE and details soon!
10
86
708
@qriousec
Qrious Secure
2 months
Check out our newest blog about how we took advantage of a WebGPU feature to turn an integer underflow bug into an arbitrary read in Chrome’s WebGPU. This bug was fixed by Google long ago, but our ticket is still restricted. https://t.co/vYvVPtF2PP by @lanleft_ + @__suto
qriousec.github.io
Introduction Back in the beginning of the year 2024, we started our project on ANGLE, it is a chromium graphic library, handling rendering stuff on chrome process. Fortunately, our team found some of...
2
34
156
@qriousec
Qrious Secure
3 months
Theses findings found by our AI Agent. Probably some writeup when more complex issue got destricted. https://t.co/ho0lrb9OEL
Tweet card summary image
github.com
Contribute to qriousec/web3_finding development by creating an account on GitHub.
0
8
32
@thezdi
Trend Zero Day Initiative
6 months
We have a full win!! Ho Xuan Ninh (@Xuanninh1412) and Tri Dang (@trichimtrich) from Qrious Secure used a 4 bug chain to exploit #NVIDIA Triton. Their unique work earns them $30,000 and 3 Master of Pwn points.
1
10
87
@thezdi
Trend Zero Day Initiative
6 months
Fantastic! Ho Xuan Ninh (@Xuanninh1412) and Tri Dang (@trichimtrich) from Qrious Secure successfully demonstrated their exploit of #NVIDIA Triton. Will it be unique or another bug collision? They are off to the disclosure room to find out. #Pwn2Own #P2OBerlin
0
8
46
@qriousec
Qrious Secure
9 months
The hibernation of our Linux kernel team has ended. Our team member @SeaDragnoL has successfully pwned the COS 109 target of Google's kernelCTF!
2
1
87
@qriousec
Qrious Secure
9 months
We kick off 2025 with a 0day in Mesa driver of Chrome GPU found by @kyr04i and @__suto
2
6
79
@qriousec
Qrious Secure
9 months
Our V8 sandbox escape found by @__suto and @lanleft_ has been derestricted https://t.co/CUnloA8HUv
0
30
141
@qriousec
Qrious Secure
11 months
Santa gave us freshly new JSC 0day ✌️
2
4
96
@qriousec
Qrious Secure
1 year
1
1
21
@bienpnn
Bien πŸ‡»πŸ‡³
1 year
This is the report of the Windows LPE bug that I used in TyphoonPwn this year.
@SecuriTeam_SSD
SSD Secure Disclosure
1 year
🚨 New advisory was just published! 🚨 A vulnerability in the Common Log File System (CLFS) driver allows a local user to gain elevated privileges on Windows 11 https://t.co/oKESMRBJ5x
2
8
78
@qriousec
Qrious Secure
1 year
After CVE-2024-0223, we reported the bypass and it was assigned CVE-2024-3516: https://t.co/VVJz6lWJt8 Months later, someone else reported another variant and Google decided to give up and allow Chrome's GPU to crash instead of fixing the issue.
1
1
17