@1nv0k3r_ Profile picture

1nv0k3r

@1nv0k3r_

Focus on Software Security, IoT Security, and Fuzz, independence researcher, developer, hearing handicap L2.

Joined July 2016
Similar User
1chig0 photo

@1chig0_sec

swing photo

@bestswngs

𝓮𝓪𝓼𝓽𝓳𝓾𝓷 photo

@e4stjun

P4nda photo

@P4nda20371774

Eqqie photo

@Eqq111e

4uuu Nya photo

@4uuu_Nya

wywwzjj photo

@wywwzjj

朽木 photo

@xiumulty

Q7 photo

@LeoQ7_

林晨 photo

@0chencc

M photo

@0xmuhe

Q1ngShan photo

@Q1ngShan

period photo

@peri0d4

1nv0k3r Reposted

CVE-2022-39197 Cobalt Strike < 4.7.1 RCE Analyze mp.weixin.qq.com/s/Eb0pQ-1ebLSK…


Do you remember when you joined Twitter? I do! #MyTwitterAnniversary

1nv0k3r_'s tweet image. Do you remember when you joined Twitter? I do! #MyTwitterAnniversary

1nv0k3r Reposted

Chinese new year gift: Wine IDA Pro in Docker, with Jupyter Notebook support github.com/NyaMisty/docke…


I have reversed all the code of certificate validation but does not found any bug wtf😰

In our 1st #Pwn2Own #AfterDark entry this evening, @Synacktiv used an improper certificate validation and a stack-based buffer overflow to compromise the NETGEAR router via the WAN interface. They earn $20,000 and 2 critical Master of Pwn points. #P2OAustin



旅游赛混了一个奖,接下来要好好研究一下aeg重构一下代码了orz,能跑起来全看命

1nv0k3r_'s tweet image. 旅游赛混了一个奖,接下来要好好研究一下aeg重构一下代码了orz,能跑起来全看命

wtf, 当初考研看到IP数据包分片这块就感觉很容易出漏洞, 但是转念一想全世界应该一堆大佬盯着这块, 没想到真有啊就 zh-cn.tenable.com/blog/microsoft…


What about change the Black Hat to Block Hat lol

This post is unavailable.

1nv0k3r Reposted

Introducing the GeForce RTX 2080 Ti Cyberpunk 2077 Edition. We made 77 for our community. Want one? Here's how: 1. RT this video. 2. Tag a gamer who is as excited as you about Cyberpunk 2077 in the replies with #RTXOn 3. If selected, you BOTH win these limited edition GPUs!


1nv0k3r Reposted

I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64. github.com/0xb0bb/pwndra

0xb0bb's tweet image. I&apos;m releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64. github.com/0xb0bb/pwndra

1nv0k3r Reposted

Geared up! #TianfuCup 2019 PWN contest kicks off at 9am tomorrow (GMT+8). Stay tuned~

TianfuCup's tweet image. Geared up! #TianfuCup 2019 PWN contest kicks off at 9am tomorrow (GMT+8). Stay tuned~

1nv0k3r Reposted

VMware just repairs the vulnerability I use in my exploit :(


my tw search history recently...

1nv0k3r_'s tweet image. my tw search history recently...

1nv0k3r Reposted

"Correlation is not causation"


1nv0k3r Reposted

The co-author who didn’t do anything


1nv0k3r Reposted

cloudflare «XSS» payload to bypass protection. 🦍 {` <body \< onscroll =1(_=prompt,_(String.fromCharCode(88,83,83,32,66,121,32,77,111,114,112,104,105,110,101)))> ´} #BugBounty #BugBountyTip #WAF #infosec


cve-2019-16928 I have a PoC now, and I am try to make it to RCE. 😝

1nv0k3r_'s tweet image. cve-2019-16928
I have a PoC now, and I am try to make it to RCE. 😝

Loading...

Something went wrong.


Something went wrong.