t0ct0u Profile Banner
dbd4 Profile
dbd4

@t0ct0u

Followers
164
Following
677
Media
0
Statuses
348

0x0f0b

Ring -1
Joined September 2020
Don't wanna be here? Send us removal request.
@e__soriano
Enrique Soriano @[email protected]
9 months
woooow rad! tmp.0ut accepted my polyglottar paper! https://t.co/InFfr2DEOw
@tmpout
tmp.0ut
9 months
Would you look at that, it's tmp.0ut Volume 4! Happy Friday, hope you enjoy this latest issue! https://t.co/n1huKfMBo9
1
4
25
@zeroclicksh
zeroclick.sh
1 year
🚀 We're back with a fresh blog redesign! Dive into @Diego_AltF4's latest post, which offers an in-depth analysis of CVE-2023-22098, including a reliable PoC to escape VirtualBox. 🛠️ Unleash your virtualization magic now! Link below ⬇️
1
20
45
@Diego_AltF4
DiegoAltF4
1 year
Blog post coming soon with an in-depth analysis and exploit development for CVE-2023-22098, discovered by the incredible @theflow0! Stay tuned, VM wizards!
1
9
100
@pagedout_zine
PagedOut
1 year
Leaking Host KASLR from Guest VMs Using Tagged TLB by @renorobertr Article Highlight #14 - check it out in Paged Out! #4 page 58 https://t.co/aDN16hz7K7
0
14
58
@zeroclicksh
zeroclick.sh
2 years
🚀 New blog alert! 🚀 Dive deep with our latest posts: 🍎 "TCC Overview and Internals" - Learn how one of the main macOS protections work 🐝"Intro to Development Using eBPF" - Start your journey with eBPF and Docker! Hope you enjoy the new content made by @esquilichii
0
6
20
@HackOnURJC
HackOn
2 years
El pasado lunes, @mundohackertv fue testigo de una ponencia inolvidable sobre la explotación de hipervisores, cortesía de nuestros compañeros @Diego_AltF4 y @t0ct0u. Una charla que nos dejó a todos con la boca abierta y con ganas de más.🤓 Enhorabuena!👾
0
5
16
@theori_io
Theori
2 years
Part 4 of our N-Day Exploit Series is LIVE! 🔥 ➡️ https://t.co/5aubfL0yNG Unveiling CVE-2023-34044, an information leakage vulnerability in #VMware Workstation’s #VBluetooth device, found by our own @pr0ln! It’s a variant of CVE-2023-20870 demonstrated by @starlabs_sg in
theori.io
CVE-2023-34044, a variant of CVE-2023-20870, was exploited to extract critical information from a VMware host process. Read the in-depth analysis. | Vulnerability Research
0
43
97
@esquilichii
Ismael
2 years
Just launched a new research blog with my colleagues and friends. Vulnerability research, OS internals and malware shenanigans will be the main topics of the blog, check it out! hxxps://zeroclick.sh/ @zeroclicksh
1
2
9
@interiorgob
Ministerio del Interior
2 years
👩‍💻🧑‍💻La @guardiacivil ha concluido esta semana su #VNationalCyberLeagueGC, competición en la que se simula un ciberincidente Los ganadores por categoría han sido 🔘 Pre-Amateur: @ColegioRetamar 🔘 Amateur: alumnos de @urjc 🔘 Profesional: @EMADmde https://t.co/wmYeYDyZvV
22
12
25
@zeroclicksh
zeroclick.sh
2 years
Easy right? Well then here is the writeup for a CTF pwn challenge that requires both linux heap and FSOP exploitation techniques. @pop_rdi_ret is the creator of both the challenge and the write up. https://t.co/3G96Ev7MEq
@zeroclicksh
zeroclick.sh
2 years
New post is up!! . Tired of not solving FSOP challenges on the latest libc? You don't need to look any further;) Intro to FSOP exploitation and House of Paper by @pop_rdi_ret https://t.co/6qD3MmO1KK
1
4
7
@zeroclicksh
zeroclick.sh
2 years
New post is up!! . Tired of not solving FSOP challenges on the latest libc? You don't need to look any further;) Intro to FSOP exploitation and House of Paper by @pop_rdi_ret https://t.co/6qD3MmO1KK
0
7
5
@zeroclicksh
zeroclick.sh
2 years
Keep calm and Qemu on!! If you want to see how to exploit a vulnerable PCI device and escape from Qemu, take a look at the writeup that @Diego_AltF4 and @t0ct0u have prepared about their HackOn 2024 challenge. https://t.co/xGPbRvCCMg
1
17
30
@e__soriano
Enrique Soriano @[email protected]
2 years
3
11
26
@mundohackertv
Mundo Hacker
2 years
0
1
4
@mundohackertv
Mundo Hacker
2 years
2
6
24
@Diego_AltF4
DiegoAltF4
2 years
A bit late, but here's my cheap PoC for CVE-2023-4911 (Looney Tunables). I hope you like it 💪 https://t.co/RRMC9WlldE
1
14
41
@ekoparty
Ekoparty | Hacking everything
2 years
¡Sumate al nuevo stream de @MrNox_: @PwnLive_, un canal para hablar de reversing, exploiting, análisis de malware, programación, y hacking! 🔥 Además de su primer invitado Diego Porras y su charla "Virtualization Security para bebés", ¡habrá SORTEO en vivo! Podés ganarte swag de
2
8
14
@pqlqpql
David Bouman
4 years
Happy to finally publish my work on the two vulnerabilities in the Linux kernel I've found: CVE-2022-1015 and CVE-2022-1016! I'll be talking some background, a deeper look into nf_tables, and a local privilege escalation PoC! (code on my github) https://t.co/8cummKtTHT
21
404
1K
@ky1ebot
kylebot
3 years
I just pwned the latest Ubuntu at Pwn2Own despite the unexpected release yesterday! This is my first in-person Pwn2Own event! And I'm so grateful to @thezdi for this amazing event!
@thezdi
Trend Zero Day Initiative
3 years
Success! Kyle Zeng from ASU SEFCOM used a double free bug to exploit Ubuntu Desktop. He earns $30,000 and 3 Master of Pwn points. #Pwn2Own #P2OVancouver
16
26
435
@chompie1337
chompie
3 years
when you open a binary to reverse it and it’s C++
29
77
906