Seo Hyun-gyu Profile
Seo Hyun-gyu

@wh1te4ever

Followers
4K
Following
219
Media
88
Statuses
372

하얀정령 https://t.co/APT1cFX2aj

Joined October 2020
Don't wanna be here? Send us removal request.
@wh1te4ever
Seo Hyun-gyu
2 years
Source code of tweak is available at
2
11
66
@wh1te4ever
Seo Hyun-gyu
3 months
At last, releasing my journey/repository about "LogoFail: From POC to arbitrary code execution”! (sorry - exploit codes will be too dirty). Thanks! https://t.co/oCuZTzNMBb
Tweet card summary image
github.com
Contribute to BoB13-BootKitty/BRLY-LOGOFAIL-2023-002 development by creating an account on GitHub.
0
0
8
@wh1te4ever
Seo Hyun-gyu
3 months
Our team achieved each OS bootkit implemented within < 1 month; In my situation at that time, I really don't have time to write paper. Couldn't be done if didn't cooperate, so shout out our team <3 (+Sumin Hwang and Youngjin Sim, and who supported et all)
1
0
6
@wh1te4ever
Seo Hyun-gyu
3 months
Thanks for listening our team's presentation. Regret to say I couldn't attend this conference due to unexpected issues, but I did most of work - especially researching vulnerabilities and linux/android boot process; poured my heart and soul into them.
@wootsecurity
USENIX WOOT Conference on Offensive Technologies
3 months
Last papers session "Exploit All the Things" (Chair: Cristine Hoepers) - Soufian El Yadmani: SecurePoC—detecting malicious GitHub exploits - Andrea Mambretti: SoK on kernel vuln discovery & auto exploit generation - Junho Lee: BOOTKITTY—stealth bootkit-rootkit for modern OSes
2
1
47
@wootsecurity
USENIX WOOT Conference on Offensive Technologies
3 months
Last papers session "Exploit All the Things" (Chair: Cristine Hoepers) - Soufian El Yadmani: SecurePoC—detecting malicious GitHub exploits - Andrea Mambretti: SoK on kernel vuln discovery & auto exploit generation - Junho Lee: BOOTKITTY—stealth bootkit-rootkit for modern OSes
0
2
14
@B1ack3at
BlackCat
3 months
It's my first paper, and it contains my research on BOOTKITTY. I’ll be presenting on August 12. See you at USENIX! https://t.co/yix4flj7HY
0
2
13
@wh1te4ever
Seo Hyun-gyu
3 months
Our Bootkitty team will announcing "A Stealthy Bootkit-Rootkit Against Modern Operating Systems" soon at USENIX WOOT25. Stay tuned for upcoming presentation. Credit: @B1ack3at, @jihoonab151, HyunA Seo, @Iranu96, @wh1te4ever, Jinho Jung, Hyungjoon Koo. https://t.co/NCyfnqqqXv
1
13
60
@wh1te4ever
Seo Hyun-gyu
3 months
Finally, the first CVE I reported to Apple has been published here... ;D https://t.co/pf5szzWdVK
10
8
182
@wh1te4ever
Seo Hyun-gyu
3 months
Tested on iOS 12.0.1, 12.1.1, 12.1.4, 12.3.1, and 12.4.2 on iPhone 6s; 12.5.7 on iPhone 5s; and 12.2 on iPad Air 1 (also 12.4.1 on iPhone 6s, thanks MasterMike) Multiple attempts may be required to successfully trigger the exploit.
0
2
20
@wh1te4ever
Seo Hyun-gyu
3 months
[Release] Re-jailbreak Utility for iOS 12 via WebKit Exploit Supports only Chimera‑jailbroken A7–A10/X devices. Live Link: https://t.co/nLGpopyHsm Source code: https://t.co/b5y4E2p0Mj
11
54
208
@wh1te4ever
Seo Hyun-gyu
5 months
iOS 12 WebKit re-jailbreak demo Currently, only the iPhone 5s running iOS 12.5.7 is supported, and there are still many issues that need to be fixed. https://t.co/4op71rnAqW
7
21
142
@dfsec_com
Dataflow Security
5 months
Our new blog post is live:
blog.dfsec.com
Dataflow Security blog
2
85
262
@wh1te4ever
Seo Hyun-gyu
6 months
another 1day practice: CVE-2025-31258 (patched in macOS 15.5) Escaped macOS sandbox, but partial. Source Code: https://t.co/wqjzyff86D Demo Video: https://t.co/1ak0ubz1Pi
3
41
188
@ProjectZeroBugs
Project Zero Bugs
6 months
XNU VM_BEHAVIOR_ZERO_WIRED_PAGES behavior allows writing to read-only pages
1
22
115
@i41nbeer
Ian Beer
7 months
My writeup of the 2023 NSO in-the-wild iOS zero-click BLASTDOOR webp exploit: Blasting Past Webp - https://t.co/H4m8MBwoWN
21
235
713
@wh1te4ever
Seo Hyun-gyu
7 months
https://t.co/1CH1WoMwKf Implemented arbitrary webkit code execution on iPhone (not PAC devices). You can chaining other exploits if you want for nice work, but do not use it for malicious purpose. Check out src and README here: https://t.co/okIlYhzno0
@wh1te4ever
Seo Hyun-gyu
9 months
Safari 1day RCE exploit (1day practice) https://t.co/iEEjo9J4YH
2
40
236
@ifsecure
Ivan Fratric 💙💛
8 months
I tweeted before about the Apple CoreAudio issues found by Google TAG. Well, the fuzz harness used to find these issues is now included in Jackalope examples, see https://t.co/nlVqpetOUN . Happy fuzzing! :)
@ifsecure
Ivan Fratric 💙💛
9 months
The latest Apple security update contains fixes for three CoreAudio issues (CVE-2025-24160, CVE-2025-24161, CVE-2025-24163). These were found by Google Threat Analysis Group using Jackalope fuzzer.
2
40
185
@quarkslab
quarkslab
9 months
Unrestrict the restricted mode for USB on iPhone. A first analysis @citizenlab #CVE-2025-24200 👉 https://t.co/CkqMPz2qEp
5
142
464