dbd4
@t0ct0u
Followers
164
Following
677
Media
0
Statuses
348
woooow rad! tmp.0ut accepted my polyglottar paper! https://t.co/InFfr2DEOw
Would you look at that, it's tmp.0ut Volume 4! Happy Friday, hope you enjoy this latest issue! https://t.co/n1huKfMBo9
1
4
25
🚀 We're back with a fresh blog redesign! Dive into @Diego_AltF4's latest post, which offers an in-depth analysis of CVE-2023-22098, including a reliable PoC to escape VirtualBox. 🛠️ Unleash your virtualization magic now! Link below ⬇️
1
20
45
Blog post coming soon with an in-depth analysis and exploit development for CVE-2023-22098, discovered by the incredible @theflow0! Stay tuned, VM wizards!
1
9
100
Leaking Host KASLR from Guest VMs Using Tagged TLB by @renorobertr Article Highlight #14 - check it out in Paged Out! #4 page 58 https://t.co/aDN16hz7K7
0
14
58
🚀 New blog alert! 🚀 Dive deep with our latest posts: 🍎 "TCC Overview and Internals" - Learn how one of the main macOS protections work 🐝"Intro to Development Using eBPF" - Start your journey with eBPF and Docker! Hope you enjoy the new content made by @esquilichii
0
6
20
El pasado lunes, @mundohackertv fue testigo de una ponencia inolvidable sobre la explotación de hipervisores, cortesía de nuestros compañeros @Diego_AltF4 y @t0ct0u. Una charla que nos dejó a todos con la boca abierta y con ganas de más.🤓 Enhorabuena!👾
0
5
16
Part 4 of our N-Day Exploit Series is LIVE! 🔥 ➡️ https://t.co/5aubfL0yNG Unveiling CVE-2023-34044, an information leakage vulnerability in #VMware Workstation’s #VBluetooth device, found by our own @pr0ln! It’s a variant of CVE-2023-20870 demonstrated by @starlabs_sg in
theori.io
CVE-2023-34044, a variant of CVE-2023-20870, was exploited to extract critical information from a VMware host process. Read the in-depth analysis. | Vulnerability Research
0
43
97
Just launched a new research blog with my colleagues and friends. Vulnerability research, OS internals and malware shenanigans will be the main topics of the blog, check it out! hxxps://zeroclick.sh/ @zeroclicksh
1
2
9
👩💻🧑💻La @guardiacivil ha concluido esta semana su #VNationalCyberLeagueGC, competición en la que se simula un ciberincidente Los ganadores por categoría han sido 🔘 Pre-Amateur: @ColegioRetamar 🔘 Amateur: alumnos de @urjc 🔘 Profesional: @EMADmde
https://t.co/wmYeYDyZvV
22
12
25
Easy right? Well then here is the writeup for a CTF pwn challenge that requires both linux heap and FSOP exploitation techniques. @pop_rdi_ret is the creator of both the challenge and the write up. https://t.co/3G96Ev7MEq
New post is up!! . Tired of not solving FSOP challenges on the latest libc? You don't need to look any further;) Intro to FSOP exploitation and House of Paper by @pop_rdi_ret
https://t.co/6qD3MmO1KK
1
4
7
New post is up!! . Tired of not solving FSOP challenges on the latest libc? You don't need to look any further;) Intro to FSOP exploitation and House of Paper by @pop_rdi_ret
https://t.co/6qD3MmO1KK
0
7
5
Keep calm and Qemu on!! If you want to see how to exploit a vulnerable PCI device and escape from Qemu, take a look at the writeup that @Diego_AltF4 and @t0ct0u have prepared about their HackOn 2024 challenge. https://t.co/xGPbRvCCMg
1
17
30
3
11
26
Este año, uno de los fichajes estrella para reforzar el #MundoHackerTeam es @t0ct0u #MundoHackerDay24. Let´s make rock&roll. https://t.co/UL1k23U8gK
#ciberseguridad #evento #hacking #hackingEtico #hacker #Happyhacking #somosciberseguridad
0
1
4
Este año, uno de los fichajes estrella para el #MundoHackerTeam es @Diego_AltF4 Bienvenido a #MundoHackerDay24. Let´s make rock&roll. https://t.co/UL1k23U8gK
#ciberseguridad #evento #hacking #hackingEtico #hacker #Happyhacking #somosciberseguridad
2
6
24
A bit late, but here's my cheap PoC for CVE-2023-4911 (Looney Tunables). I hope you like it 💪 https://t.co/RRMC9WlldE
1
14
41
Happy to finally publish my work on the two vulnerabilities in the Linux kernel I've found: CVE-2022-1015 and CVE-2022-1016! I'll be talking some background, a deeper look into nf_tables, and a local privilege escalation PoC! (code on my github) https://t.co/8cummKtTHT
21
404
1K
I just pwned the latest Ubuntu at Pwn2Own despite the unexpected release yesterday! This is my first in-person Pwn2Own event! And I'm so grateful to @thezdi for this amazing event!
Success! Kyle Zeng from ASU SEFCOM used a double free bug to exploit Ubuntu Desktop. He earns $30,000 and 3 Master of Pwn points. #Pwn2Own #P2OVancouver
16
26
435