
Zero Day Engineering
@zerodaytraining
Followers
8K
Following
599
Media
45
Statuses
326
Advanced Exploit Cognition by @alisaesage • Private research node: https://t.co/RTyJ2RpHDb • Telegram mirror: https://t.co/WDjQQrzTtR
Worldwide
Joined January 2015
RT @kn9vn: I've been taking the Browser Exploitation Training from @alisaesage and @zerodaytraining, and I can honestly say this is one of….
0
5
0
RT @alisaesage: This patch relaxes alias analysis in v8's turboshaft compiler to avoid live store elimination on unobserved nodes, the effe….
0
7
0
RT @alisaesage: 2/ @zerodaytraining isn’t content. It’s zero to hardcore cognition architecture, expressed under the domain of technology e….
0
1
0
0-day discovery and exploit engineering are cognitively orthogonal in how they challenge inherent limits of the human brain. In this video our exploit architect @alisaesage talks through the root level of what makes either hard, & how to deal with it:
0
8
41
RT @alisaesage: New video: On Zero Days & Exploit Engineering 🎥 I started as a kid cracking video games for God Mo….
0
34
0
RT @zerodaytraining: "I'm excited to start off 2024 by completing Zero Day Engineering's Zero Day Vulnerability Research course. Alisa Es….
0
9
0
Alum @_jaelkoh reflects on two years in offensive security:.This year, he returns post-OSEE to our advanced binary exploitation track — an alignment pattern we see often. When you realise how ZDE system works, exit isn't an option.
0
10
33
Next cohort of Browser Exploit Design training program is open for booking: June-August 2025, with technical consultation by @alisaesage.
1
1
12
Field echo detected!. @alisaesage's "Fuzzing from First Principles" lecture dropped the seed – now it shapes reasoning and operations. That’s how structural insight moves. Full blog:
0
11
60
“Zero Day Engineering isn’t about hunting bugs or ‘exploit dev’. It’s the art of seeing structure beneath patterns, architecting potential through computational constraints, and designing systems that express it as sovereignty.” — @alisaesage.
0
5
36
RT @alisaesage: iOS PAC mitigation exploits share operational pattern with hypervisor VMX escapes. Hardware exposes the framework, software….
0
7
0
RT @alisaesage: Playing with Safari exploits on my Linux-based Browser Exploitation training VM
0
40
0
RT @alisaesage: Black Hat Asia was the first conference that I attended as a rookie security researcher, years ago when it was still held i….
0
7
0