vxradius Profile Banner
Eugene Rodionov Profile
Eugene Rodionov

@vxradius

Followers
5K
Following
1K
Media
5
Statuses
1K

Security Researcher

Joined September 2010
Don't wanna be here? Send us removal request.
@vxradius
Eugene Rodionov
1 year
A big honor to coauthor with @abc_sup and Gulshan the very first blog from Android Red Team on analysis and exploitation of CVE-2023-20938 in Android Binder driver at šŸ”„ .The slide-deck presented at @offensive_con is available at
2
36
86
@vxradius
Eugene Rodionov
9 months
RT @a13xp0p0v: Slides for my talk at @h2hconference 2024:. Diving into Linux kernel security 🤿. I described how to learn this complex area….
0
80
0
@grok
Grok
22 days
Introducing Grok Imagine.
2K
4K
28K
@vxradius
Eugene Rodionov
10 months
RT @domenuk: Slides for my @ekoparty talk "Advanced Fuzzing.With LibAFL".- >.
Tweet card summary image
docs.google.com
Advanced Fuzzing With LibAFL Dominik Maier Ekoparty 2024-11-15 1
0
94
0
@vxradius
Eugene Rodionov
10 months
RT @ayper: Excited to share our latest post on memory safety! We're tackling spatial safety in our massive C++ codebase by hardening libc+….
Tweet card summary image
security.googleblog.com
Posted by Alex Rebert and Max Shavrick, Security Foundations, and Kinuko Yasuda, Core Developer Attackers regularly exploit spatial mem...
0
51
0
@vxradius
Eugene Rodionov
10 months
RT @spaceraccoonsec: ā€œBreak into the world of vulnerability research. and become a zero-day hunter.ā€ I have a new book with @nostarch!. B….
Tweet card summary image
nostarch.com
Find vulnerabilities before anyone else does.
0
141
0
@vxradius
Eugene Rodionov
10 months
RT @andreyknvl: Getting made fun of because you cover laptop webcam with a sticker? 😭. Here are materials from my talk about controlling Th….
0
143
0
@vxradius
Eugene Rodionov
10 months
RT @bsdaemon: A while ago I've given a talk on how to build exceptional security research teams: - I continue convi….
Tweet card summary image
github.com
Presentations in different conferences. Contribute to rrbranco/Presentations development by creating an account on GitHub.
0
30
0
@vxradius
Eugene Rodionov
10 months
RT @domenuk: Project Zero blog:.LLMs find 0days now! šŸ‘€. And: our fuzzer setup did *not* reproduce it! https://t.c….
0
150
0
@vxradius
Eugene Rodionov
10 months
RT @Flipacholas: As promised, here is a new article: PlayStation Vita (Part 1). Enjoy!.
Tweet card summary image
copetti.org
An in-depth analysis that explains how this console works internally
0
81
0
@vxradius
Eugene Rodionov
11 months
RT @halbecaf: CVE-2024-9143 ( was disclosed recently, which was found by OSS-Fuzz-Gen! This is a pretty proud examp….
0
23
0
@vxradius
Eugene Rodionov
11 months
RT @klecko0: I've written a post on SELinux and some public bypasses for Android kernel exploitation. It's especially relevant for Samsung….
klecko.github.io
This post aims at giving an overview of what SELinux is, how it is implemented, and how to bypass it, from the point of view of Android kernel exploitation.
0
131
0
@vxradius
Eugene Rodionov
11 months
RT @domenuk: Excited to give this talk šŸ”„šŸ”„šŸ”„.
0
7
0
@vxradius
Eugene Rodionov
11 months
RT @matrosov: IDAlib is the first idiomatic Rust bindings library for @HexRaysSA IDA SDK, helping go beyond C/C++ or Python in RE automatio….
0
26
0
@vxradius
Eugene Rodionov
11 months
RT @matrosov: šŸ’„PoC is now public! . target = " https://{ip_address}/cgi/login.cgi".command = "touch /tmp/BRLY". libc = 0x76283000 # we tr….
Tweet card summary image
github.com
BINARLY Research Tools and PoCs. Contribute to binarly-io/ToolsAndPoCs development by creating an account on GitHub.
0
93
0
@vxradius
Eugene Rodionov
11 months
RT @domenuk: We have cleaned up the #LibAFL example fuzzers!.This makes things easier to find and understand. Thanks to @rmalmain . Take a….
0
25
0
@vxradius
Eugene Rodionov
11 months
RT @jeffvanderstoep: I’m super excited about this blogpost. The approach is so counterintuitive, and yet the results are so much better tha….
Tweet card summary image
security.googleblog.com
Posted by Jeff Vander Stoep - Android team, and Alex Rebert - Security Foundations Memory safety vulnerabilities remain a pervasive threa...
0
76
0
@vxradius
Eugene Rodionov
11 months
Exciting story on collaboration between Google Android Offsec and ARM product security on proactively securing Mali GPU attack surface in Android and beyond. Among proactively identified and mitigated issues is CVE-2024-0153 in GPU firmware.
@royalhansen
Royal Hansen
11 months
We teamed up with @Arm to boost GPU security on #Android!Ā  Fuzzing, firmware analysis, and close collaboration led to key vulnerability discoveries and a stronger #Android ecosystem. Read more in our joint blog:
0
6
22
@vxradius
Eugene Rodionov
1 year
Continuing the series on exploiting AndroidĀ Binder with Binder internals blogĀ Deep dive into Binder driver byĀ @abc_sup and Gulshan. We also releaseĀ -- tiny lib featuring how to do IPC via Binder driver. Happy Binder hacking!.
Tweet card summary image
github.com
Contribute to androidoffsec/libdevbinder development by creating an account on GitHub.
0
18
68