@retr0reg Profile picture

retr0reg

@retr0reg

15 | c/python threat-researcher. I do research in different areas. CVEs in transformers, tensorflow, llamafile, llama-cpp-python…

Pinned

My latest blog about my discovery for Evernote Client All-platform RCE via PDF.js font-injection to preload.js exposed ipcRenderer-BrokerBridge-boron.actions bypassing Electron's nodeIntegration | context-isolation; Enjoy reading! 0reg.dev/blog/evernote-…


My latest research and fun methodology/vector you should consider in model attacks! Great post by @byt3bl33d3r / @DanHMcInerney!

👀 AI model file #hacking: @byt3bl33d3r & @DanHMcInerney walk you through how @retr0reg pushed .llamafile boundaries, injecting a payload with no flags. Pretty wild shit huntrs. While this isn't a vuln persay it’s definitely a method worth knowing. 👇 bit.ly/40ACO14



Glad that my research on GGUF CVE-2024-34359 got featured in @ProtectAICorp latest Insight DB with the cooperation with @huggingface Huggingface’s Guardian successfully detected my PoC model as a threat! Glad to contribute to the AI/ML Community!

Tweet Image 1

Been doing some really fun research recently. However can’t publish these yet due to lots of reasons, wait for it!

Tweet Image 1

This is a blog about how I exploited Tenda Ac8's 0day remote overflow into RCE via mipsel ROPing with multi-regs. It includes experience that I learn from 2 weeks of gdb-multiarch-ing, mipsrop-ing, QEMU-ing, IDA-ing, ifconfig-ing from scratch to CVE. 0reg.dev/blog/tenda-ac8…


My latest 0day exploit on @tendaoffcial 's Ac8v4 Router Mipsel-ROP Remote-Code Execution! I even need to control $t9 in this case!


New writeup! This is a 6 Milion user note app XSS -> RCE in electron bypassing the nodeintegration I found about a month ago. If you don't know much about Electron & LaTex, that okay! I introduced detailed step-to-step analysis about How I find this RCE! 0reg.dev/blog/electron-…


United States Trends
Loading...

Something went wrong.


Something went wrong.