@In0de_16 Profile picture

Will Huang

@In0de_16

Security Researcher (Windows, MacOS)

Similar User
faulty *ptrrr photo

@0x_shaq

Mickey Jin photo

@patch1t

Jordy Zomer photo

@pwningsystems

Brendan Chamberlain photo

@infosecb

tsunekoh photo

@tsunek0h

NiNi photo

@terrynini38514

Nick Powers photo

@zyn3rgy

Dan Revah photo

@danrevah

KevinLu photo

@K3vinLuSec

Gergely Kalman photo

@gergely_kalman

codecolorist@infosec.exchange photo

@CodeColorist

Jonathan Bar Or (JBO) 🇮🇱🇺🇸🇺🇦🎗️ photo

@yo_yo_yo_jbo

NexusFuzzy 💩 photo

@NexusFuzzy

Ferdous Saljooki photo

@malwarezoo

Brandon Dalton photo

@PartyD0lphin

Pinned

Last month, I completed a practical training course at CYBERSEC on how to hunt threat with sigma rules. "Lumos! Illuminate the dark hacker attack trail use Sigma rules to enhance threat hunting capabilities" speakerdeck.com/will03/lumos-i… Lab materials are provided below. #SIGMA


Will Huang Reposted

As promised, I just dropped a dozen new sandbox escape vulnerabilities at #POC2024 If you missed the talk, here is the blog post: jhftss.github.io/A-New-Era-of-m… Slides: github.com/jhftss/jhftss.… Enjoy and find your own bugs 😎

Actually, 15+ new sandbox escape vulnerabilities discovered. All of them are simple logic issues. You may find your own sandbox 0-days by yourself after listening to this talk!🔥🔥🔥



Will Huang Reposted

Finding #TeamViewer 0days Part 1 - The story begins pgj11.com/posts/Finding-… Part 2 - Reversing the Authentication Protocol pgj11.com/posts/Finding-… Part 3 - Putting it all together. PARTY TIME pgj11.com/posts/Finding-…


Will Huang Reposted

Will Huang Reposted

I've published a new blog post detailing how to write an iOS kernel exploit for PhysPuppet from scratch. Enjoy! alfiecg.uk/2024/09/24/Ker…


Will Huang Reposted

I finished the promised article about System Integrity Protection #SIP, which introduces the #Apple idea of #rootless on #macOS. The article is for anyone interested in: #Programming #Re #Cybersecurity karol-mazurek.medium.com/system-integri… Enjoy reading!


Will Huang Reposted

Latest awesome-detection-engineering addition: DEBMM - Elastic's qualitative and quantitative approach to measuring threat detection program maturity. elastic.co/security-labs/… github.com/infosecB/aweso…


Will Huang Reposted

Hooking Objective C code is pretty straightforward

Tweet Image 1

Will Huang Reposted

Wow! Microsoft Recall reviews! "⭐️⭐️⭐️⭐️⭐️, it helped our customers get more and faster" - Redline stealer "⭐️⭐️⭐️⭐️⭐️, helped us optimize our code base. Love it!" - Formbook stealer "⭐️⭐️⭐️⭐️⭐️, so easy to use! Required no work to get information" - Rhadamanthys stealer

Tweet Image 1

Will Huang Reposted

1/4: We've discovered a fully undetectable #stealer targeting #macOS. It has maintained a zero-detection rate on VirusTotal since its first submission on 17/05/2024. This stealer is allegedly linked to Rodrigo4, a known Russian-speaking threat actor from XSS underground forums.

Tweet Image 1
Tweet Image 2

Will Huang Reposted

C’mon Apple, iOS kernel vulnerability is not eligible for bounty? What would then be? It could have been ended up in @DonnchaC or @jsrailton blogs. 🤦‍♂️

Tweet Image 1

I reported CVE-2024-27804, an iOS/macOS kernel vulnerability that leads to the execution of arbitrary code with kernel privileges. Will publish the POC soon. support.apple.com/en-gb/HT214101



DYLD_INSERT_LIBRARIES still works !!!

CVE-2024-34456: Trend Micro Antivirus One Dylib Injection syrion.me/CVE-2024-34456… #applesecurity #macossecurity #macosredteam



Will Huang Reposted

Hey @windscribecom congrats on 69M customers! Here's a 0day LPE in your shitware: gergelykalman.com/why-you-should… (I posted this twice as Windscribe doesn't even own @windscribe :D)

Tweet Image 1

Will Huang Reposted

We published our blog post "Bringing process injection into view(s): exploiting all macOS apps using nib files", about a process injection vulnerability in macOS. It's a follow up to our insecure deserialization in saved application state research. sector7.computest.nl/post/2024-04-b…


Will Huang Reposted

🚨📢 Insomni'hack 2024 🛡️[SPEAKER] Patch Different on *OS by John McIntosh 👉 Don’t miss the opportunity to attend this conference! Details and registration: ow.ly/X28F50R11Fy #INSO24 #Insomnihack #CyberSecurity

Tweet Image 1

Will Huang Reposted

iVerify (@IsMyPhoneHacked) released the industry's only commercial tool capable of detecting Pegasus and other advanced iOS malware today: iverify.io/post/introduci…

Tweet Image 1
Tweet Image 2

Will Huang Reposted

Full Disclosure time: Here's a quick LPE for macOS that affects you if you have Homebrew installed under /usr/local (Intel macs or Apple Silicon with Game Porting Toolkit) github.com/gergelykalman/… You have to wait for periodic.daily to run, but that's a small price to pay


Will Huang Reposted

xpcroleaccountd Root Privilege Escalation: jhftss.github.io/CVE-2023-42942…


Will Huang Reposted

🔺New on the Apple Security Research blog: introducing PQ3, a groundbreaking post-quantum cryptographic protocol for iMessage. To our knowledge, PQ3 has the strongest security properties of any at-scale messaging protocol in the world. security.apple.com/blog/imessage-…


Will Huang Reposted

🚨 Please check our in-depth analysis report regarding #RustDoor, a macOS #malware disguised as VisualStudio update. 🕵️‍♂️ Further dig reveals Windows version, dubbed #GateDoor—coded in Golang. Stay vigilant! #Cybersecurity #ThreatIntel #S2W medium.com/s2wblog/rustdo…


Will Huang Reposted

The #GoldDigger family grows: Group-IB's TI Unit finds GoldPickaxe.iOS, the first #iOS #Trojan harvesting #FacialRecognition data for unauthorized bank access, targeting #APAC. It is linked to the GoldDigger family discovered last October. Learn more: bit.ly/3UHDaAq

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.