SYSPWN
@syspwnx
Followers
268
Following
36
Media
7
Statuses
43
SysPWN : A place to learn more about Vulnerability Research and make yourself ready for world-class hacking competitions
Germany
Joined June 2023
CVE-2025-59362 Squid Web Proxy Cache 7.1-VCS - snmp message processing stack based buffer-overflow https://t.co/KJda8fSgnh
github.com
My CVE(s) / Security Disclosures. Contribute to Microsvuln/advisories development by creating an account on GitHub.
1
7
17
We released our Fuzzilli-based V8 Sandbox fuzzer: https://t.co/eVkR1bl76n It explores the heap to find interesting objects and corrupts them in a deterministic way using V8's memory corruption API. Happy fuzzing!
github.com
This is a basic fuzzer for the V8 Sandbox. It uses the memory corruption API to implement a random-but-deterministic (given a seed) traversal through the V8 heap object graph and corrupts some obje...
2
74
296
Prior to Pwn2Own Automotive 2024, ZDI posted a number of articles outlining the attack surfaces of the devices part of the competition. In the EV charger space compared to IVIs, there is quite limited public research although this has been changing recently.
1
3
23
The top skill a vulnerability researcher can have is persistence.
7
13
161
Refreshing our technical deep dive into DNS exploitation which is still very relevant. Watch and learn how we uncover the entire process of finding and exploiting a vulnerability in a DNS parser. From zero to exploit, it's all here. Part1: https://t.co/TOKDIdX1MG
1
43
168
Here’s the talk I did for @syspwnx in the past as well if you missed it: https://t.co/V2423LrOIh
0
10
26
The recording of the second session of SysPWN with @RabbitPro from @FlashbackPwn on PWN2OWN Hacking Game is up on youtube! https://t.co/n54oRbu7M1 Sorry for delay in uploading! we were quite busy! Enjoy it!
1
13
37
We're live now! https://t.co/wg3AezMKMa
Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! https://t.co/SowGIYEK37
0
1
2
We're live now! https://t.co/JD6XFp2ZGh
Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! https://t.co/SowGIYEK37
1
0
0
We'll be live in about 1 hour from now with @RabbitPro to learn from his experiences of Vulnerability Research for #PWN2OWN contests! Come and see awesome content from @FlashbackPwn Flashback team ! #SYSPWN #VulnerabilityResearch
Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! https://t.co/SowGIYEK37
1
0
4
I will be talking about our experience playing Pwn2Own games, what kind of vulns together with @pedrib1337 we have been finding and I will provide a bit more technical details about 2 selected ones. Tune in especially if you consider p2o in the future 👇
Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! https://t.co/SowGIYEK37
1
10
42
Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! https://t.co/SowGIYEK37
0
9
24
📢📢📢Thrilled to announce @FlashbackPwn's presence in our upcoming #syspwn event on November 9, 2023, at 16:30 CEST! Radek (@RabbitPro) will discuss his pwn2own experiences, preparation, and how they tackled challenges in vulnerability research for #pwn2own contests!
2
6
19
📢📢📢 Excited to announce that we'll have FlashBack team @FlashbackPwn in our next session of SysPWN . @FlashbackPwn will present how they PWNed devices at PWN2OWN competitions . Stay tuned for our next announcement about the date and time of this event!
0
8
19
The recording of our session with @alexjplaskett on Vulnerability research and team building strategies for PWN2OWN competitions is up now! https://t.co/iqVluUDXoh Enjoy it! #SYSPWN #PWN2OWN #Hacking #VulnerabilityResearch
1
10
35
Enjoy the session with Alex Plaskett! you can learn a ton from him .
The recording of our session with @alexjplaskett on Vulnerability research and team building strategies for PWN2OWN competitions is up now! https://t.co/iqVluUDXoh Enjoy it! #SYSPWN #PWN2OWN #Hacking #VulnerabilityResearch
1
2
8
The recording of our session with @alexjplaskett on Vulnerability research and team building strategies for PWN2OWN competitions is up now! https://t.co/iqVluUDXoh Enjoy it! #SYSPWN #PWN2OWN #Hacking #VulnerabilityResearch
1
10
35
Alex released the great presentation he gave yesterday at @syspwnx . Again, we're grateful to @alexjplaskett and @NCCGroupInfosec for accepting our invitation and this contribution. The recording of the session will be available soon as well!
I have just released my slides for "VR for Pwn2" from @syspwnx talk I gave yesterday. Covering general P2O/VR experience, SoHo Smash-Up Ubiquiti and Lexmark printers. https://t.co/t7JS0nRJrA
0
0
9
Slides from @alexjplaskett talk at @syspwnx have now been released: https://t.co/geZXYYaOsp Covering vulnerability research for Pwn2Own, Soho-smashup and printer vulns.
0
13
40