steventseeley Profile Banner
ϻг_ϻε Profile
ϻг_ϻε

@steventseeley

Followers
22K
Following
12K
Media
383
Statuses
6K

Artist disguised as a logician. Pwn2Own Winner.

Joined April 2011
Don't wanna be here? Send us removal request.
@steventseeley
ϻг_ϻε
1 year
This full chain analysis from discovery to exploit has been added to Full Stack Web Attack. The last training for this year is at Romhack between 24th-27th of September at Student discount codes available, PM me but I only have a few left.
romhack.io
@steventseeley
ϻг_ϻε
1 year
Of course I had to finish it off ^_^
Tweet media one
3
9
52
@steventseeley
ϻг_ϻε
1 day
RT @carrot_c4k3: finally got around to writing up my windows exploit from pwn2own vancouver 2024! (plus some notes about using it on xbox)….
0
81
0
@grok
Grok
5 days
Generate videos in just a few seconds. Try Grok Imagine, free for a limited time.
359
649
3K
@steventseeley
ϻг_ϻε
3 days
What do you think the chances are that there are more pre-auth bugs in this?.
@Horizon3Attack
Horizon3 Attack Team
3 days
Our latest disclosures for CVE-2025-8355 and CVE-2025-8356 - discovering a critical RCE in Xerox FreeFlow Core .
0
0
10
@steventseeley
ϻг_ϻε
3 days
RT @Horizon3Attack: Our latest disclosures for CVE-2025-8355 and CVE-2025-8356 - discovering a critical RCE in Xerox FreeFlow Core . https:….
0
61
0
@steventseeley
ϻг_ϻε
3 days
RT @0x_shaq: Dropped a new blogpost. CVE-2025-52970: how I turned a limited, blind OOB read primitive into a full authentication bypass in….
Tweet card summary image
pwner.gg
Hello world! long time no see. I was so busy, mainly with working on symbol.exchange (btw opened a new “Bug Driven Development” community) and started to try my way in academia.
0
81
0
@steventseeley
ϻг_ϻε
4 days
RT @richinseattle: Proud moment. The 40th anniversary @phrack release was a full success. We gave away 12,000 full color 150pg printed zine….
0
39
0
@steventseeley
ϻг_ϻε
6 days
Tweet media one
0
3K
0
@steventseeley
ϻг_ϻε
6 days
RT @xvonfers: Whoah. $250000. (CVE-2025-4609, similar to CVE-2025-2783/412578726)[412578726][Mojo][IpczDriver]ipcz bug -> renderer duplic….
0
58
0
@steventseeley
ϻг_ϻε
8 days
0
16
0
@steventseeley
ϻг_ϻε
9 days
RT @smaury92: 👋🏿 Hackers!. Are you a Red Teaming Wizard 🧙🏿 looking for a new challenge? @ShielderSec is hiring a Red Teaming Lead to join o….
Tweet card summary image
romhack.io
Check for RomHack sponsor's job opportunities
0
6
0
@steventseeley
ϻг_ϻε
9 days
. it takes 24 hours, waiting for a daily cron, but we get there. :->
Tweet media one
@MCKSysAr
MCKSys Argentina
11 days
@steventseeley pop thy shell !!!.
2
0
47
@steventseeley
ϻг_ϻε
9 days
RT @danis_jiang: Our “Dark Corners: How a Failed Patch Left VMware ESXi VM Escapes Open for Two Years” slides are now available!. This rese….
0
42
0
@steventseeley
ϻг_ϻε
9 days
Everyone: OMG I hope AI doesn’t take my job 😱😱🫣.Me: When is AI gonna get good so I can retire? 🫠🫠🫠.
0
1
9
@steventseeley
ϻг_ϻε
9 days
RT @claudeai: We just shipped automated security reviews in Claude Code. Catch vulnerabilities before they ship with two new features:. - /….
0
777
0
@steventseeley
ϻг_ϻε
10 days
RT @dozernz: @mufinnnnnnn Tabby is perfect for that sort of thing. Needs decent compute resources upfront but you can then write Cypher que….
Tweet card summary image
github.com
A CAT called tabby ( Code Analysis Tool ). Contribute to tabby-sec/tabby development by creating an account on GitHub.
0
1
0
@steventseeley
ϻг_ϻε
10 days
RT @mufinnnnnnn: I made a quick write up discussing techniques to get code execution against Apache Spark SQL: I'm….
0
15
0
@steventseeley
ϻг_ϻε
11 days
RT @PulpLibrarian: Computers are taking our jobs! (1952)
Tweet media one
0
170
0
@steventseeley
ϻг_ϻε
11 days
Yep, still got it.
Tweet media one
3
0
75
@steventseeley
ϻг_ϻε
11 days
RT @nirohfeld: We (+@ronenshh) hacked NVIDIA's Triton AI server by abusing a single error message🚨. The result is unauthenticated RCE allow….
0
61
0