@Ma7h1as Profile picture

Mathias

@Ma7h1as

Google / Github Security Hall of Fame , Apple / Mozilla / Gitlab Security Advisory , Microsoft Top 100 Security Researcher , Tweets are my own.

Similar User
sakura photo

@eternalsakura13

Zhihua Yao photo

@hackyzh

k0shl photo

@KeyZ3r0

Rancho Ice photo

@RanchoIce

swing photo

@bestswngs

Jiantao Li photo

@CurseRed

M photo

@0xmuhe

flanker017 photo

@flanker_hqd

just a script kid. photo

@hjy79425575

Wen Xu photo

@0xtarafans

P4nda photo

@P4nda20371774

VictorV photo

@vv474172261

Dlive photo

@D1iv3

Jioundai photo

@Jioun_dai

zenhumany photo

@zenhumany

Pinned

My honor to speaking at Blackhat USA 2019 @BlackHatEvents , will disclose more vulnerabilities that have not been shared yet. #BHUSA blackhat.com/us-19/briefing…

Tweet Image 1

The fact is that I knew nothing about file format vulnerabilities before June this year. I choose GDI+ as the target to hunt one, spend about 1 week on it. Finally get 5 OOBR(W) bugs ,hope this non-innovative fuzzer may help beginner in this field like me. github.com/math1as/Window…


Finally glad to see that Google add my name to the CVE-2020-6519 credit page. I report this bug 1 year before the researcher from PerimeterX. but get no response until I know they use it for exaggerated publicity. The impact of this vulnerability is mild but does hurt CSP.

Tweet Image 1

Oh it's patch tuesday. I'm happy to release the exploit of CVE-2020-1337 , this year's leet CVE-ID. also known as windows print spooler privilege escalation bug. thanks @md5_salt for the great idea. github.com/math1as/CVE-20…


I am glad to be on the list under such intense competition.

Congratulations to our 2020 MSRC Most Valuable Security Researchers! We are thrilled to see so many researchers contributing to the security of millions of customers and the broader ecosystem. Check out our blog for the full list: #ResearcherRecognition msrc-blog.microsoft.com/2020/08/05/ann…



Oops, seems that we got this year's leet CVE-ID together.

Tweet Image 1

Second time I “automatically” got assigned the year’s leet CVE. 🙏🏻 Can’t wait to share details later!

Tweet Image 1


Mathias Reposted

LNK again portal.msrc.microsoft.com/en-us/security… this time collide with @expend20 (finally) 😅 I should really stop this and learn some new stuff...


Spending more than 1 week on writing a stable harness. just get tired. 😂


Took some photos this year , enjoy the feeling of wandering.

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

Glad to be on 16th place.

Congratulations to everyone listed on our Security Researcher Leaderboard for the last quarter, especially top three researchers Zhiniang Peng, Yang Kang, and Ashar Javed! See our blog for the full list of top researchers for the previous quarter: msrc-blog.microsoft.com/2020/01/15/msr…



Mathias Reposted

NTLM reflection is back to haunt windows. Read about Ghost Potato here (this time with a fixed link): shenaniganslabs.io/2019/11/12/Gho…


oh I am so honored & happy.... thank you so much for your work.

This is relevant to my interests.

Tweet Image 1


Mathias Reposted

my exploit vs exploit mitigations:


:D what the heck. I used to believe there is another guy good at breaking sandbox.

This is relevant to my interests.

Tweet Image 1


Mathias Reposted

My first ZDI blog: Details+PoC of Pwn2Own 2019 Mozilla Firefox MArraySlice Incorrect Alias Information Vulnerability (CVE-2019-9810) and Mozilla Firefox IonMonkey Type Confusion Vulnerability (CVE-2019-9813):

A tale of two #Firefox JIT vulns: @hosselot breaks down 2 different #Pwn2Own winning Firefox bugs that were recently patched by Mozilla. bit.ly/2PjeKsV



Patch Tuesday

Tweet Image 1

Glad to be on Microsoft's Online Service Acknowledgements portal.msrc.microsoft.com/zh-cn/security…


Loading...

Something went wrong.


Something went wrong.