Seo Hyun-gyu
@wh1te4ever
Followers
4K
Following
219
Media
88
Statuses
372
하얀정령 https://t.co/APT1cFX2aj
Joined October 2020
At last, releasing my journey/repository about "LogoFail: From POC to arbitrary code execution”! (sorry - exploit codes will be too dirty). Thanks! https://t.co/oCuZTzNMBb
github.com
Contribute to BoB13-BootKitty/BRLY-LOGOFAIL-2023-002 development by creating an account on GitHub.
0
0
8
Our team achieved each OS bootkit implemented within < 1 month; In my situation at that time, I really don't have time to write paper. Couldn't be done if didn't cooperate, so shout out our team <3 (+Sumin Hwang and Youngjin Sim, and who supported et all)
1
0
6
Thanks for listening our team's presentation. Regret to say I couldn't attend this conference due to unexpected issues, but I did most of work - especially researching vulnerabilities and linux/android boot process; poured my heart and soul into them.
Last papers session "Exploit All the Things" (Chair: Cristine Hoepers) - Soufian El Yadmani: SecurePoC—detecting malicious GitHub exploits - Andrea Mambretti: SoK on kernel vuln discovery & auto exploit generation - Junho Lee: BOOTKITTY—stealth bootkit-rootkit for modern OSes
2
1
47
Last papers session "Exploit All the Things" (Chair: Cristine Hoepers) - Soufian El Yadmani: SecurePoC—detecting malicious GitHub exploits - Andrea Mambretti: SoK on kernel vuln discovery & auto exploit generation - Junho Lee: BOOTKITTY—stealth bootkit-rootkit for modern OSes
0
2
14
It's my first paper, and it contains my research on BOOTKITTY. I’ll be presenting on August 12. See you at USENIX! https://t.co/yix4flj7HY
0
2
13
Our Bootkitty team will announcing "A Stealthy Bootkit-Rootkit Against Modern Operating Systems" soon at USENIX WOOT25. Stay tuned for upcoming presentation. Credit: @B1ack3at, @jihoonab151, HyunA Seo, @Iranu96, @wh1te4ever, Jinho Jung, Hyungjoon Koo. https://t.co/NCyfnqqqXv
1
13
60
Finally, the first CVE I reported to Apple has been published here... ;D https://t.co/pf5szzWdVK
10
8
182
Tested on iOS 12.0.1, 12.1.1, 12.1.4, 12.3.1, and 12.4.2 on iPhone 6s; 12.5.7 on iPhone 5s; and 12.2 on iPad Air 1 (also 12.4.1 on iPhone 6s, thanks MasterMike) Multiple attempts may be required to successfully trigger the exploit.
0
2
20
[Release] Re-jailbreak Utility for iOS 12 via WebKit Exploit Supports only Chimera‑jailbroken A7–A10/X devices. Live Link: https://t.co/nLGpopyHsm Source code: https://t.co/b5y4E2p0Mj
11
54
208
iOS 12 WebKit re-jailbreak demo Currently, only the iPhone 5s running iOS 12.5.7 is supported, and there are still many issues that need to be fixed. https://t.co/4op71rnAqW
7
21
142
My writeup on CVE-2025-31200. This ones an interesting one https://t.co/z2AmzC8A4W. thanks to @bellis1000 for the shoutout.
blog.noahhw.dev
Background On April 16, 2025, Apple released a patch for a bug in CoreAudio which they said was “Actively exploited in the wild.” This flew under the radar a bit. Epsilon’s blog has a great writeup...
5
63
223
another 1day practice: CVE-2025-31258 (patched in macOS 15.5) Escaped macOS sandbox, but partial. Source Code: https://t.co/wqjzyff86D Demo Video: https://t.co/1ak0ubz1Pi
3
41
188
XNU VM_BEHAVIOR_ZERO_WIRED_PAGES behavior allows writing to read-only pages
1
22
115
My new blog post, which I presented at #Zer0Con2025 binary level macOS KEXT kernel address sanitizer.
r00tkitsmm.github.io
In the part 1 of my tutorial style blog post about fuzzing, I discussed how we can instrument the macOS KEXTs to collect code coverage at the basic block or edge level.
3
84
304
My writeup of the 2023 NSO in-the-wild iOS zero-click BLASTDOOR webp exploit: Blasting Past Webp - https://t.co/H4m8MBwoWN
21
235
713
https://t.co/1CH1WoMwKf Implemented arbitrary webkit code execution on iPhone (not PAC devices). You can chaining other exploits if you want for nice work, but do not use it for malicious purpose. Check out src and README here: https://t.co/okIlYhzno0
Safari 1day RCE exploit (1day practice) https://t.co/iEEjo9J4YH
2
40
236
I tweeted before about the Apple CoreAudio issues found by Google TAG. Well, the fuzz harness used to find these issues is now included in Jackalope examples, see https://t.co/nlVqpetOUN . Happy fuzzing! :)
The latest Apple security update contains fixes for three CoreAudio issues (CVE-2025-24160, CVE-2025-24161, CVE-2025-24163). These were found by Google Threat Analysis Group using Jackalope fuzzer.
2
40
185
Unrestrict the restricted mode for USB on iPhone. A first analysis @citizenlab #CVE-2025-24200 👉 https://t.co/CkqMPz2qEp
5
142
464
Our latest blog post: Tracing Back to the Source | #SPTM Round 3 #TXM #iOS #macOS #DFF
https://t.co/UvKZI9MNeq
df-f.com
Our goal at DFF is to reveal any threats on mobile devices, and that requires us to keep up to date with every single version of Android and iOS, including the beta and "Developer Preview" phases....
3
51
113