@the_st0rm Profile picture

the_storm

@the_st0rm

Security Engineer @Lacework, Ex @Meta, @Deloitte, @SecForce_LTD. CTFer with LCBC, vulnerability researcher and exploit dev. Opinions are my own

Similar User
mohammed eldeeb photo

@malcolmx0x

Ahmed Sultan 🇵🇸 photo

@0x4148

Nicolas Grégoire photo

@Agarri_FR

Ebrahem Hegazy 🇵🇸 photo

@Zigoo0

Gwendal Le Coguic photo

@gwendallecoguic

Uranium238 photo

@uraniumhacker

Mahmoud Gamal photo

@Zombiehelp54

@securitymb@infosec.exchange photo

@SecurityMB

dia2diab photo

@dia2diab

Mohamed Sayed (ret2flex) 🇵🇸 photo

@FlEx0Geek

Youssef A. Mohamed photo

@GeneralEG64

Ron Chan photo

@ngalongc

Alvaro Muñoz photo

@pwntester

Sayed Abdelhafiz photo

@dPhoeniixx

Michael Stepankin photo

@artsploit

Pinned

I am thrilled to announce that I will be presenting @BlackHatEvents "Do You Speak My Language? Make Static Analysis Engines Understand Each Other" blackhat.com/us-21/briefing… Using static analysis to find security bugs cross-language and cross-repo #BHUSA


the_storm Reposted

Anyone spending the brief liminal window between Christmas and Georgian new year in Hamburg, with the hackers, at CCC? I am! And I'll be presenting new research and a new talk ☺️ . What happens when we put love and intimacy at the center of our understanding of privacy, and…

Tweet Image 1

the_storm Reposted

A no bull shit staright up fAcTuAl RCE, choke on this

hop skip jump over to our latest blog post - analysing Fortinet's FortiJump CVE-2024-47575, FortiJump-Higher (we love this name😄) and beyond (PoC included) labs.watchtowr.com/hop-skip-forti…



the_storm Reposted

👋 a bit of late news, but I recently left Microsoft to build a startup. We closed our pre-seed and have a nice position. I'm looking for a solid SWE with experience in KVM/Xen/Hypervisors. If you are interested or know someone, please DM. JD here: stealthium.notion.site/Software-Engin…


the_storm Reposted

CVE-2024-9143 (openssl-library.org/news/secadv/20…) was disclosed recently, which was found by OSS-Fuzz-Gen! This is a pretty proud example of our team showing the promise of leveraging LLMs enable more fuzzing coverage.


the_storm Reposted

Exploiting two kernel vulnerabilities within the Mali GPU in Google Pixel 7 and 8 Pro models (Android 14) github.com/0x36/Pixel_GPU… Credits @_simo36 #Android #infosec

Tweet Image 1
Tweet Image 2

Impressive research and writeup! You have to include imgs.xkcd.com/comics/depende…

Tweet Image 1

Attacking UNIX Systems via CUPS, Part I evilsocket.net/2024/09/26/Att…



the_storm Reposted

New writeup from @_specters_ and I: we're finally allowed to disclose a vulnerability reported to Kia which would've allowed an attacker to remotely control almost all vehicles made after 2013 using only the license plate. Full disclosure: samcurry.net/hacking-kia


the_storm Reposted

there is a challenge in idekCTF 2024 called srcdoc-memos made by icesfont, it's about iframe, sandbox, CSP, navigation, session history and policy container. I spent like a week to understand how it works lol, really complex but also interesting. blog.huli.tw/2024/09/07/en/…


the_storm Reposted

Such a delight to sit down with the great @a_greenberg for a long engaged convo on surveillance, AI, my wild path through tech, and how by rejecting the toxic norm Signal provides a shining model for better, healthier tech futures♥️ wired.com/story/meredith…


the_storm Reposted

Signal is blocked in several countries but you can set up a proxy server to help people access Signal no matter where they live. Here’s how: signal.org/blog/proxy-ple… Thank you for helping keep Signal available for everyone who needs it. To share your proxies use #SignalProxy


Absolutely! 🚀 It's been an incredible journey working on code security at @Lacework Big shoutout to the amazing team!

I've been fortunate to work with some great people on code security @Lacework . Here's a description work we've been up to on the security of 1st-party code. (with @dildog , @the_st0rm , @Vatlidak , @pascalkesseli + FrancescoP, JeremyD, LinpengZ) lacework.com/blog/sast-for-…



the_storm Reposted

1/ A world first reverse engineering analysis of AWS Session Tokens. Prior to our research these tokens were a complete black box. Today, we are making it more of a glass box, by sharing code and tools to analyze and modify AWS Session Tokens. medium.com/@TalBeerySec/r…


the_storm Reposted

My @LocoMocoSec keynote slides on "Google's Recipe for Scaling (Web) Security" are online now: speakerdeck.com/lweichselbaum/…

Tweet Image 1

the_storm Reposted

Linux システムの起動プロセス、勉強になった。 1. 電源オン 2. BIOS/UEFI が起動し、POST (Power-On Self-Test) を実行 3. デバイスの検出 4. 起動デバイスの選択 5. ブートローダー (GRUB) の実行 - /etc/grub2.cfg の読み込み - カーネルの実行 - 必要なライブラリの読み込み 6. systemd…

Tweet Image 1

the_storm Reposted

This weekend, I played with Blue Water in GoogleCTF. Here are my challenge writeups. Give them a read, I had a lot of fun writing them! TL;DR: Rust reversing, inverting a crappy cipher, finite fields :D 👇 github.com/perfectblue/ct…


the_storm Reposted

For what is worth, I gave a talk about "Python specialized bytecode" and a "pycjail returns" CTF challenge recently. A TL;DR of specialized bytecode as well as the talk video and slides (where I also talk about Python jails) can be found on disconnect3d.pl/2024/06/20/pyt…


Loading...

Something went wrong.


Something went wrong.