Similar User
sakura photo

@eternalsakura13

starlabs photo

@starlabs_sg

晏子霜 photo

@YanZiShuang

k0shl photo

@KeyZ3r0

seal photo

@seal9055

mj0011 photo

@mj0011sec

ohjin photo

@pwn_expoit

heige photo

@80vul

VictorV photo

@vv474172261

Lays photo

@_L4ys

swing photo

@bestswngs

Lê Hữu Quang Linh 🇻🇳 photo

@linhlhq

Jiantao Li photo

@CurseRed

P4nda photo

@P4nda20371774

Quan Jin photo

@jq0904

dma-buf: heaps: Fix off-by-one in CMA heap fault handler - Patchwork patchwork.freedesktop.org/patch/611976/ @1ce0ear 没想到给大佬提交了🤣


Chomre delete this UAF.I missed this one🤡 chromium-review.googlesource.com/c/chromium/src…


现在骗子也可以光明正大的打广告了?X也不管管

Tweet Image 1

UPSTREAM: binder: fix UAF caused by offsets overwrite (5843736) · Gerrit Code Review (googlesource.com)


Zhihua Yao Reposted

Speaker YYJB will be presenting "How to Exploit in Key Isolation Services Vulnerabilities at SgHACK 2024 (sghack.org) #SgHACK #WhiskeyCon #Cybersecurity #CybersecurityinSG


Zhihua Yao Reposted

Our researcher Slim (@HBh25Y) shared at @offbyoneconf: The Forgotten Treasure in Classic Targets: Despite powerful fuzzers like AFLplusplus & syzkaller, recent vulnerabilities show secrets lie deep in the code. Manual audits on Linux kernel & mobile decoders reveal many…

Tweet Image 1

Zhihua Yao Reposted

@offbyoneconf participants in 💡 deep-thoughts & fielding questions @ Q&A with @peterpan980927 & @st424204 from ✨ @starlabs_sg , at their presentation 𝐆𝐏𝐔𝐀𝐅 - 𝐔𝐬𝐢𝐧𝐠 𝐚 𝐠𝐞𝐧𝐞𝐫𝐚𝐥 𝐆𝐏𝐔 𝐞𝐱𝐩𝐥𝐨𝐢𝐭 𝐭𝐞𝐜𝐡 𝐭𝐨 𝐚𝐭𝐭𝐚𝐜𝐤 𝐏𝐢𝐱𝐞𝐥𝟖. Go go 🚀@starlabs_sg

Tweet Image 1
Tweet Image 2

Zhihua Yao Reposted

In this post I'll use CVE-2024-3833, a type confusion in v8 to gain remote code execution in the Chrome renderer sandbox: github.blog/2024-06-26-att…


today learn a lot.Thanks off by one!

Stop by at the @offbyoneconf merchandise booth for some cool merch!



Loading...

Something went wrong.


Something went wrong.