thomasrinsma Profile Banner
Thomas Rinsma Profile
Thomas Rinsma

@thomasrinsma

Followers
1K
Following
2K
Media
9
Statuses
88

Looking for strange loops and weird machines. Lead security analyst @CodeanIO.

Netherlands
Joined March 2013
Don't wanna be here? Send us removal request.
@thomasrinsma
Thomas Rinsma
4 days
@qynln With this we're slowly building up primitives to do almost anything. Still an open problem is a way to get to globalThis/window in more general contexts without unsafe-eval.
0
0
2
@thomasrinsma
Thomas Rinsma
4 days
Great challenge in SekaiCTF by @qynln based on my WASM escape talk/article. I especially like the Symbol.toPrimitive trick for better function calling, also allowing for control over thisArg!.
1
5
49
@grok
Grok
7 days
What do you want to know?.
577
369
2K
@thomasrinsma
Thomas Rinsma
7 days
You can now read my WASM->JS escape write-up online. Full PoC is included at the end of the article.
@phrack
Phrack Zine
8 days
At long last - Phrack 72 has been released online for your reading pleasure! . Check it out:
Tweet media one
2
35
156
@thomasrinsma
Thomas Rinsma
14 days
The recording of my WHY2025 talk is up, see below. The PoC I showed will be in the digital release of @phrack 72, coming soon :).
0
13
37
@thomasrinsma
Thomas Rinsma
19 days
Currently at #WHY2025. If you're also here, let me know and we can meet up :).
0
0
0
@thomasrinsma
Thomas Rinsma
22 days
Next week at WHY2025 I will be speaking about a trick I found to break out of WASM (e.g. like below) into JS, eval-ing arbitrary code. If you prefer to read, the full write-up will also be published in Phrack 72 :). WebAssembly.instantiateStreaming(fetch("evil.wasm"), {});.
1
0
7
@thomasrinsma
Thomas Rinsma
3 months
Here's the write-up for the OpenPGP.js signature spoofing bug which @b0n0b0__ and I found. The PoC is included at the end, where we demonstrate by spoofing a message by the Dutch government's Cyber Security Center ;).
Tweet card summary image
codeanlabs.com
CVE-2025-47934 allows attackers to spoof arbitrary signatures and encrypted emails that appear as valid in OpenPGP.js. The only requirement is access to a single valid signed message from the target...
3
32
143
@thomasrinsma
Thomas Rinsma
3 months
RT @yeswehack: InfoSec media has jumped on the story of a vulnerability found via the OpenPGP.js Bug Bounty program on @yeswehack that allo….
0
8
0
@thomasrinsma
Thomas Rinsma
6 months
Just published the write-up of two bugs I found in LibreOffice, allowing remote exfiltration of file/env data and a semi-arbitrary file write. Also relevant for document conversion/preview usecases :).
Tweet card summary image
codeanlabs.com
Attackers can write semi-arbitrary files in the filesystem, and remotely extract values from environment variables and from INI-like files in the filesystem via two vulnerabilities in LibreOffice....
2
17
103
@thomasrinsma
Thomas Rinsma
7 months
Finally cleaned up and published my hacky "toolchain" for running custom code on vulnerable Verifone POS devices, enjoy:
Tweet card summary image
github.com
Talk + exploit for bootloder vuln in several Verifone VX devices - ThomasRinsma/vx_pos_hacks
0
0
1
@thomasrinsma
Thomas Rinsma
7 months
Hey cool, my PDF.js exploit made it to this list, thanks!.
@PortSwiggerRes
PortSwigger Research
7 months
The results are in! We're proud to announce the Top ten web hacking techniques of 2024!
1
1
50
@thomasrinsma
Thomas Rinsma
7 months
RT @netspooky: Ange just casually playing Tetris in a PDF
Tweet media one
0
3
0
@thomasrinsma
Thomas Rinsma
7 months
RT @angealbertini: We played with JavaScript in PDFs:.API difference, text or hex literals or indirect objects. Triggers on document openin….
0
11
0
@thomasrinsma
Thomas Rinsma
8 months
RT @linguinelabs: You know I had to do it. Bad Apple but it's a PDF
0
19
0
@thomasrinsma
Thomas Rinsma
8 months
I couldn't resist.
@thomasrinsma
Thomas Rinsma
8 months
Yes, PDF runs DOOM! (PDFium only for now)
0
0
11
@thomasrinsma
Thomas Rinsma
8 months
I got nerdsniped ;) In the end it was not too difficult, Emscripten really is magical. Source here:
Tweet card summary image
github.com
DOOM in a PDF (as ascii art). Contribute to ThomasRinsma/pdfdoom development by creating an account on GitHub.
1
1
33