seal9055 Profile Banner
seal Profile
seal

@seal9055

Followers
2K
Following
278
Media
5
Statuses
142

Vulnerability Researcher at @InterruptLabs

Massachusetts, US
Joined January 2021
Don't wanna be here? Send us removal request.
@seal9055
seal
2 years
@steven_rossi_ and I taught a course on Binary Exploitation and Vulnerability Analysis at UMass Amherst for the past 2 years. After this semester's offering we decided to open source all course material including lecture vods, slides, and projects. https://t.co/xzadGh9tJy
9
101
276
@seal9055
seal
1 month
Been a while since my last blog post. Fun project I worked on recently that I got to write about. Hope you enjoy the writeup!
1
4
20
@gegrgtezrze
Zerotistic
1 year
Excited to share my latest blog post: "Breaking Control Flow Flattening: A Deep Technical Analysis" I showcase usage of formal proofs and graph theory to automate CFF deobfuscation, among other things ! Might make it a talk...? πŸ‘€ https://t.co/iWoP9GeZhX
zerotistic.blog
Control flow flattening (CFF) is an interesting form of code obfuscation. While most obfuscation techniques focus on making individual operations hard to understand, CFF goes for something more...
4
68
234
@ret2systems
RET2 Systems
1 year
A few months back we submitted two exploit chains to the first ever Pwn2Own Automotive competition. We just released a blogpost (part 1 of 2) detailing the bugs we abused to remotely exploit the Phoenix CHARX industrial EV charger and win $60,000 πŸ”₯πŸ”₯ https://t.co/HmRCIzJm0E
Tweet card summary image
blog.ret2.io
The first Pwn2Own Automotive introduced an interesting category of targets: electric vehicle chargers. This post will detail some of our research on the Phoe...
5
56
181
@UMassCyberSec
UMass Cybersecurity Club
2 years
We are pleased to announce our third annual UMassCTF, UMassCTF2024, is coming up soon! From April 19th @ 6pm EST to April 21st @ 6pm EST, we will be hosting the competition at https://t.co/NBcWckVmvo. Join our discord server for more information at https://t.co/qYptGwSGon.
0
6
9
@trailofbits
Trail of Bits
2 years
Fuzzing is preferred over formal verification because proving the absence of bugs is usually unattainable, and fuzzing identifies the same bugs with less effort.
blog.trailofbits.com
We recently introduced our new offering, invariant development as a service. A recurring question that we are asked is, β€œWhy fuzzing instead of formal verification?” And the answer is, β€œIt’s compli...
3
12
126
@symeonp
symeon
3 years
After 2 years here's a new blog post:Fuzzing TinyBMP in Rust||From dumb to structure-aware guide.If you're new-ish to Rust and want to dive in and see how you can play w dumb and smart fuzzing give it a try! Shouts to @addisoncrump_vr for the massive help!
0
9
35
@rebane2001
Rebane
2 years
Okay I made it public, enjoy :P https://t.co/EEvOw4DxLj
@rebane2001
Rebane
2 years
for those wondering what this is, I mapped all the Chrome bug bounty submissions to their rewards and commits and turned it into a tree view that can be browsed interactively it's money *others* have made not me haha πŸ˜„
10
65
316
@seal9055
seal
2 years
Really cool start, curious to see where this goes!
@h0mbre_
h0mbre
2 years
starting a new fuzzer project on the blog that is based on an old @gamozolabs idea. in the first post, we load a statically built Bochs emulator ELF into our fuzzer process and execute it. there is some code and the humble beginnings of a repo. lets gooo
0
1
10
@maxpl0it
maxpl0it
2 years
Massively proud of the @InterruptLabs crew. Even with an extremely unlucky draw order and a certain vendor playing games we’ve landed joint 3rd out of 30 teams
@thezdi
Trend Zero Day Initiative
2 years
That's a wrap on #Pwn2Own Toronto 2023! We awarded $1,038,250 for 58 unique 0-days during the event. Congratulations to Team Viettel (@vcslab) for winning Master of Pwn with $180K and 30 points. We'll see you at Pwn2Own Automotive in Tokyo next January.
2
8
81
@_stigward
Jack Maginnes πŸ΄β€β˜ οΈ
2 years
My FiiO M6 presentation from BSidesRDU is now up on YouTube :) https://t.co/P1qZclVdQP
0
4
12
@peter_a_goodman
Peter Goodman
2 years
PASTA is the culmination of years of work trying to wrangle reliable and actionable data out of Clang. The effort has required a lot of hacking and custom patches to Clang, especially in the preprocessor, but the results speak for themselves.
@trailofbits
Trail of Bits
2 years
Clang isn't a toolsmith's compiler. PASTA tries to fix this by providing safe-to-use C++ and Python wrappers to the Clang AST. PASTA also answers questions that Clang can't, like how parsed tokens relate back to macro expansions and files. Learn more:
0
8
28
@insu_yun
INSU YUN
2 years
SeungHyun in our lab found critical vulnerbilities in vm2, which is a well known JavaScript sandbox. Unfortunatetly, these bugs cannot be fixed without changing its whole sandboxing strategy. So now vm2 becomes DEPRECATED 😳😳😳
@0x10n
Xion
2 years
vm2 is now officially deprecated due to several vulnerabilities under disclosure process. https://t.co/NiCHy3o5jT
1
10
109
@seal9055
seal
2 years
Happy to announce that I'll be starting as a vulnerability researcher at @InterruptLabs next week!
10
2
84
@awesomekling
Andreas Kling
2 years
I have received a $100,000 sponsorship specifically for Ladybird browser development! πŸ€“πŸžπŸŒ More details to come..
73
75
2K
@castilho101
castilho
2 years
A new blog post about 3 vulnerabilities I found in the Kanboard Management Software with over 10 million downloads and how a user could've spread malicious tasks across all the projects, enjoy! https://t.co/L21TpBH1D5
1
6
33
@swiIIionaire
Swillion
2 years
Over the past semester, I've been working on creating a software simulator for the R3000 CPU, including mem/cache and a MIPS-1 assembler. If you have 30 minutes, try writing and running your own programs on it! https://t.co/ieoGkXXH4F
Tweet card summary image
github.com
C++-based simulator of the R3000 CPU. Contribute to rsalz47/i-love-you-r3000 development by creating an account on GitHub.
1
1
9
@steven_rossi_
Steven Rossi
2 years
For the past two years me and @seal9055 taught a binary exploitation class at @manningcics , today we’re making the lectures and materials public for everyone at
@seal9055
seal
2 years
@steven_rossi_ and I taught a course on Binary Exploitation and Vulnerability Analysis at UMass Amherst for the past 2 years. After this semester's offering we decided to open source all course material including lecture vods, slides, and projects. https://t.co/xzadGh9tJy
3
15
65
@seal9055
seal
2 years
Topics Include: - Reverse Engineering - Stack Exploitation (Shellcode, ROP, Mitigation Bypasses) - Heap Exploitation (Glibc Intro, House of Force, Tcache Dup) - Program Analysis (Fuzzing, Intel Pin, LLVM, Symbolic)
1
0
12
@seal9055
seal
2 years
Gonna be apartment hunting in Manhattan next week, let’s see how that will go :P
1
0
2
@richinseattle
Richard Johnson
2 years
@Laughing_Mantis I’m open for subcontract work writing custom fuzzers, harnesses, or emulator extensions. I’ll update my site soon, but past work on https://t.co/aIZmtJTBE3 is representative of my skill set and I have a resume on linkedin. Also open for private training, syllabus is on the site.
fuzzing.io
Research Presentations Evolutionary Kernel Fuzzing Recon, Montreal, Canada, July 2017 Black Hat, Las Vegas, USA, July 2017 Harnessing Intel Processor Trace on Windows for Vulnerability Discovery Hack...
0
14
37