rwprimitive Profile Banner
Himanshu Khokhar Jaat Profile
Himanshu Khokhar Jaat

@rwprimitive

Followers
22
Following
5
Media
0
Statuses
46

Vulnerability Researcher and Exploit Developer

127.0.0.1
Joined May 2023
Don't wanna be here? Send us removal request.
@andreyknvl
Andrey Konovalov
2 years
The "Randomized slab caches for kmalloc()" patch was merged into mainline. With CONFIG_RANDOM_KMALLOC_CACHES=y, each kmalloc cache is split into 16. kmalloc uses a random one for each allocation based on the code location. Choices change every reboot. https://t.co/EoSYZxc8gI
1
34
110
@andreyknvl
Andrey Konovalov
2 years
Updates for the Linux kernel exploitation collection. https://t.co/8T4WCiAzlR
Tweet card summary image
github.com
0
6
42
@c0m0r1
c0m0r1
2 years
CVE-2023-3390: UAF on Linux Netfilter nftables MFT_MSG_NEWRULE leads to LPE. We exploit this tiny 1-day vuln to pwn all targets of Google's kernelCTF for the first time in history. Nice and clear triple-kill 🥳
7
81
342
@sirdarckcat
Eduardo Vela
2 years
lol 9 Linux Kernel exploits in 6 minutes. #kernelCTF @koczkatamas https://t.co/n3e7T9hVLC
3
94
455
@rwprimitive
Himanshu Khokhar Jaat
2 years
Will be delivering a 1 day workshop on Linux Kernel Exploitation as a way of giving it back to the community. It's free to attend and join.
@seasides_conf
Seasides
2 years
We r extremely delighted to announce a premium content & advanced level training on Linux kernel exploitation by @rwprimitive . Details on below link: https://t.co/myfFoew3Bb This training is sponsored by @EnciphersLabs .Thank you @0ctac0der for supporting us. #infosec #cybersec
0
1
1
@0xor0ne
0xor0ne
2 years
Excellent blogpost by @Synacktiv on Android heap allocator jemalloc (version >= 5) https://t.co/3LmhPmCXrk #infosec #exploit #android
0
59
186
@bienpnn
Bien 🇻🇳
2 years
PoC for CVE-2023-31248. This was used to exploit Ubuntu Desktop at Pwn2Own Vancouver 2023. https://t.co/lAnlhyHn5b
4
106
336
@0xor0ne
0xor0ne
2 years
Nice blog post on exploiting VirtualBox on Windows (CVE-2023-21987 and CVE-2023-21991) https://t.co/E3vPy2raRR #virtualbox #infosec
1
113
329
@0xor0ne
0xor0ne
2 years
Type confusion in Safari browser (analysis of CVE-2022-42856) https://t.co/6NQT9xSz2v #cybersecurity
0
35
110
@linkersec
Linux Kernel Security
2 years
UNCONTAINED: Uncovering Container Confusion in the Linux Kernel A paper by @JakobKoschel, @borrello_pietro, et al. about finding type confusion bugs in container_of invocations. Paper: https://t.co/EGWUE00Lup Overview:
vusec.net
Uncovering Container Confusion in the Linux Kernel  TL;DR We present uncontained, a framework to detect type confusion bugs originating from incorrect downcasting operations in non-object-oriented...
0
11
50
@0xor0ne
0xor0ne
2 years
3
116
313
@theflow0
Andy Nguyen
4 years
Yet another Linux kernel exploitation write-up! CVE-2021-22555: Turning \x00\x00 into 10000$ https://t.co/Rwb26sGljK
34
413
1K
@0xor0ne
0xor0ne
2 years
Great blog post for learning a bit more about Linux kernel internals Scheduling and context switch in ARM32 https://t.co/ScNcbuzh6W #Linux #kernel #learning
2
119
409
@0xor0ne
0xor0ne
2 years
VirtualBox internals and exploitation (CVE-2023-21987 and CVE-2023-21991) Credits @qriousec https://t.co/E3vPy2raRR #infosec #cybersecurity #cve #virtualbox
1
79
256
@PetrBenes
Petr Beneš
2 years
Fun fact: 5 years ago someone proposed a patch to QEMU so that it has a built-in WinDBG support. https://t.co/OiV3t6u6BC It was apparently rejected. However it can be found here, for those interested:
1
31
126
@0xor0ne
0xor0ne
2 years
Introduction to embedded firmware emulation for security analysis using QEMU Great content by @olivier_boschko https://t.co/mtHe1RRyjn #qemu #emulation #iot #embedded #infosec
4
131
457
@bluefrostsec
Blue Frost Security
2 years
CVE-2023-2008 - Analyzing and exploiting a bug in the udmabuf driver by @dialluvioso_ and @esanfelix
0
51
128
@rwprimitive
Himanshu Khokhar Jaat
2 years
0
0
1