@pppturtle Profile picture

Pavel

@pppturtle

Head of Vulnerability Research @ https://t.co/B0f2yNQvoA CTF player @ SPRUSH

Pinned

CVE‑2024‑38063 - Windows TCP/IP RCE patch analysis bi.zone/eng/expertise/…

Tweet Image 1

Pavel Reposted

To pwners and reversers: Have you tried my GEF fork? Features: - Kernel commands (without "vmlinux with symbols"; for qemu-system) - More architectures support (for qemu-user) - Minor heap allocator dumper And many more! Bugs? Please report them:) Enjoy! github.com/bata24/gef


Vulnerability Research team at BI.ZONE has proved the exploitability of CVE-2024-38812 and CVE-2024-38813 which are critical vulnerabilities in VMware vCenter.


Pavel Reposted

Hi, here is my memory corruption PoC for CVE-2024-7965 github.com/bi-zone/CVE-20… . Topic with writeup bi.zone/expertise/blog… . (English version will be soon).


Pavel Reposted

I successfully triggered vulnerability and got memory corruption. Wait some days for paper =)


Pavel Reposted

From Theory to Practice: Kernel Heap Spray Exploitation for Privilege Escalation💥 Part two of the blog series by my colleague Alex: northwave-cybersecurity.com/exploiting-ent…

Tweet Image 1

Pavel Reposted

Analyze the exploitability of non-control objects (data only) objects in Linux kernel arxiv.org/pdf/2401.17618 #Linux #cybersecurity

Tweet Image 1
Tweet Image 2

United States Trends
Loading...

Something went wrong.


Something went wrong.