@cassidy6564 Profile picture

cassidy6564

@cassidy6564

Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd. bug hunter,chrome security,android security,0-day,exploit

Similar User
sakura photo

@eternalsakura13

Dohyun Lee photo

@l33d0hyun

POC_Crew 👨‍👩‍👦‍👦 photo

@POC_Crew

Zhihua Yao photo

@hackyzh

ohjin photo

@pwn_expoit

swing photo

@bestswngs

Khalil Zhani photo

@Khalil_Zhani

VictorV photo

@vv474172261

P4nda photo

@P4nda20371774

Jioundai photo

@Jioun_dai

Wen Xu photo

@0xtarafans

Lord_Idiot photo

@__lord_idiot

hungtt28 photo

@hungtt28

Rancho Ice photo

@RanchoIce

P1umer photo

@p1umer

Thanks google vrp🎉

📯As we wrap up 2022, the Chrome VRP is pleased to announce the top Chrome VRP Researchers of 2022. Congratulations and great work! Thank you for all your contributions and efforts over this past year & helping us make Chrome Browser and Chrome OS more secure for all users!

Tweet Image 1


cassidy6564 Reposted

Browser Exploitation Introduction twitter.com/i/broadcasts/1…


cassidy6564 Reposted

This is probably the most complex exploit I've done so far. A UAF in Android kernel freed by kfree_rcu (introduces a delay) in a tight race + kCFI + Samsung RKP. Yet its still possible to gain arbitrary kernel RW, disable SE and root from untrusted app. github.blog/2022-06-16-the…


cassidy6564 Reposted

The slide of my talk today `The Hidden RCE Surfaces That Control the Droids` is now available at speakerdeck.com/flankerhqd/the… and relevant pocs/fuzzing harness/scripts has been uploaded to github: github.com/flankerhqd/ven… #BHASIA @BlackHatEvents


cassidy6564 Reposted

一天收入1M美金的平台 @LooksRareNFT ,我先小抄一点吧。

Tweet Image 1

cassidy6564 Reposted

I will be talking about CVE-2022-23848, how codeql is securing the open source space, and how to create healthy relationships with the security community! Register at ow.ly/Pf6650IMXwy cc @GHSecurityLab

Tweet Image 1

cassidy6564 Reposted

The next blog post in the C++ memory corruption series. This time we’ll look at corrupting the std::string object. blog.infosectcbr.com.au/2022/03/c-memo…


cassidy6564 Reposted

CVE-2022-0337 System environment variables leak on Google Chrome, Microsoft Edge and Opera github.com/Puliczek/CVE-2…

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

cassidy6564 Reposted

[New Blog Post] Simple way to bypass GateKeeper, hidden for years jhftss.github.io/CVE-2022-22616… Demo: youtube.com/watch?v=S5moPn…


cassidy6564 Reposted

I’m going to randomly pick 3 people who retweet this to receive a copy of the book. I’ll tweet out the winners tomorrow. I’ll also be giving away two more copies later this week complements of @RayRedacted! …and maybe a couple more next week just for university students

Tweet Image 1

cassidy6564 Reposted

Everyone uses google search these days... But do you know how to use it like a Pro? How to maximize the productivity? ✨ Let's see how to use it in a Professional way. ✨ A Thread 🧵 ↓

Tweet Image 1

cassidy6564 Reposted

#ContiLeaks Parse ALL CVE #vulnerabilities discussed. find . -regextype posix-extended -regex '.*([0-9]+-){3}.*\.json' | xargs printf "jq -r '.messages[].msg' %q | grep -iPo 'cve-\d+-\d+'\n" | parallel -u -j 4 {} | tr '[:upper:]' '[:lower:]' | sort | uniq Tada! 😇

Tweet Image 1

cassidy6564 Reposted

If you are from #Ukraine and need a place to stay for the time being, my wife and I (and our 3 cats) can offer our guest room with two beds. We're located in Zürich, Switzerland and will cover food and other living expenses. DMs are open, RT for signal.


cassidy6564 Reposted

Want to find XSS in a list of 100000 URLs? This will give you all the URLs that have parameters commonly vulnerable to XSS. cat urls.txt | uro | parth --pipe xss

Tweet Image 1

cassidy6564 Reposted

Zweig (@realBrightiup) of Kunlun Lab has released a writeup for an iOS 15 exploit that can achieve kernel r/w. #iOS15 #exploit cyberkl.com/cvelist/cvedet…


cassidy6564 Reposted

In his final blog on finding bugs using taint analysis, @renorobertr experiments with #CodeQL’s IR and #Clang checkers for detecting untrusted pointer derefs & tainted loop conditions. These techniques led to multiple vuln discoveries. Read the details at zerodayinitiative.com/blog/2022/2/22…


cassidy6564 Reposted

I've put the slides of my #doomchip talk online: antexel.com/doomchip_onice… (link to talk recording on first slide). If you are wondering what a GPU for #Doom 1993 could have looked like, or are simply interested in Computer Graphics 'from scratch' (on #fpga), check it out!


Loading...

Something went wrong.


Something went wrong.