HackSysTeam's profile picture. Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning

HackSys Team

@HackSysTeam

Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning

Pinned

🚨 We're hiring! 🚨 Hi everyone! HackSys Inc. is seeking an enthusiastic **Vulnerability Researcher** (Windows/Android/Browser) to join our team full-time — here in India! 🇮🇳🛡️ 👀 What we’re looking for: - Approximately **2+ years of experience** in hands-on vulnerability…


HackSys Team reposted

Made a pwn challenge for this year’s HITCON CTF, which required participants to bypass PAC, BTI, and deal with relative vtables. Here’s the write-up: bruce30262.github.io/hitcon-ctf-202… Check it out if you're interested🙂


HackSys Team reposted

It’s time to publish the blog post about the bug that won at P2O Berlin 2025. Enjoy! With this post, I mark my last moment as a researcher at @oobs_io. I’m moving on to a new place for a fresh start.🔥🦎 oobs.io/posts/four-byt…


HackSys Team reposted

Recently attended an amazing Windows Kernel Exploitation training at @_c0c0n_ by @HackSysTeam's Ashfaq Ansari! 🔥 Ashfaq was an incredible trainer - made complex kernel concepts easy to grasp. Also won the CTF! 🏆 Big thanks to Ashfaq and HackSysTeam! 🙏


HackSys Team reposted

Bidding farewell to one of the last Windows kernel address leaks, CVE-2025-53136 (KASLR bypass). Sometimes, even patches can open new doors for exploitation. crowdfense.com/nt-os-kernel-i…


HackSys Team reposted

Check out our newest blog about how we took advantage of a WebGPU feature to turn an integer underflow bug into an arbitrary read in Chrome’s WebGPU. This bug was fixed by Google long ago, but our ticket is still restricted. qriousec.github.io/post/oob-angle/ by @lanleft_ + @__suto


HackSys Team reposted

Last weekend, I participated in corCTF and solved the Android Pwn challenge - corphone. It was a great challenge, and I learned a lot from it. Here's my write-up :) u1f383.github.io/android/2025/0…


HackSys Team reposted

My new article: "Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel"⚡️ I tell a bug collision story and introduce my pet project kernel-hack-drill, which helped me to exploit the hard bug that received @PwnieAwards 2025 a13xp0p0v.github.io/2025/09/02/ker…

a13xp0p0v's tweet image. My new article: "Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel"⚡️

I tell a bug collision story and introduce my pet project kernel-hack-drill, which helped me to exploit the hard bug that received @PwnieAwards 2025

a13xp0p0v.github.io/2025/09/02/ker…
a13xp0p0v's tweet image. My new article: "Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel"⚡️

I tell a bug collision story and introduce my pet project kernel-hack-drill, which helped me to exploit the hard bug that received @PwnieAwards 2025

a13xp0p0v.github.io/2025/09/02/ker…

HackSys Team reposted

Part 1 of my article series on fine-tuning an LLM for analysis of massive amounts of Intel Processor Trace is up. Use cases: codebase vulnerability scan, at-scale bug triage, etc. With thanks to @33y0re, @ivanrouzanov, and @vGPUArthur: alansguigna.com/2025/08/using-…

AlanSguigna's tweet image. Part 1 of my article series on fine-tuning an LLM for analysis of massive amounts of Intel Processor Trace is up. Use cases: codebase vulnerability scan, at-scale bug triage, etc. With thanks to @33y0re, @ivanrouzanov, and @vGPUArthur: alansguigna.com/2025/08/using-…

HackSys Team reposted

New blog post: A journey in Android physical memory - writeup on exploiting recent GPU bug CVE-2025-21479 dawnslab.jd.com/android_gpu_at…


HackSys Team reposted

The problem described in your JSON would potentially be exploitable, with some factors depending like whats in the buffer and what you control - have a look at this repo and some tutorials, setup a machine to debug - github.com/hacksysteam/Ha…


HackSys Team reposted

3 Day Hand-on Training – Advanced Windows Kernel Exploitation Take a deep dive into Windows kernel internals, Fuzzing, privilege escalation, & advanced exploitation techniques. More details: c0c0n.org #infosec #CyberSecurity #SecurityConference #hacker #exploit

_c0c0n_'s tweet image. 3 Day Hand-on Training – Advanced Windows Kernel Exploitation

Take a deep dive into Windows kernel internals, Fuzzing, privilege escalation, & advanced exploitation techniques. 

More details: c0c0n.org

#infosec #CyberSecurity #SecurityConference #hacker #exploit

HackSys Team reposted

Looks like @BlueHatIL talks are online now, so here’s my talk for anyone who wanted to learn about the latest episode of KASLR and couldn’t make it: youtu.be/Dk2rLO2LC6I

yarden_shafir's tweet card. BlueHat IL 2025 - Yarden Shafir - Look, Ma—No Privileges! How Windows...

youtube.com

YouTube

BlueHat IL 2025 - Yarden Shafir - Look, Ma—No Privileges! How Windows...


HackSys Team reposted

@typhooncon is already over, but we enjoyed every minute ! During our talk "Journey To Freedom", we disclosed for the first time the details on the Windows LPE we used at Pwn2Own Vancouver 2024 after escaping from VirtualBox. Slides are already available: reversetactics.com/publications/2…


HackSys Team reposted

🚨 Recently Discovered Windows Kernel Vulnerability 🚨 We've published an advisory for a severe Local Privilege Escalation in dxkrnl.sys, which has been patched by Microsoft. 🛡️ CVE-2025-29812 🔗 Complete advisory: hacksys.io/advisories/HI-… 🎥 Demo video: youtu.be/y5urzgTQZN0

HackSysTeam's tweet card. Microsoft Windows dxgkrnl Untrusted Pointer Dereference Local...

youtube.com

YouTube

Microsoft Windows dxgkrnl Untrusted Pointer Dereference Local...


DirectX Graphics Kernel Elevation of Privilege Vulnerability msrc.microsoft.com/update-guide/v…


HackSys Team reposted

Code reuse in the age of kCET and HVCI by @slowerzs blog.slowerzs.net/posts/keyjumpe…

alexjplaskett's tweet image. Code reuse in the age of kCET and HVCI by @slowerzs

blog.slowerzs.net/posts/keyjumpe…

Loading...

Something went wrong.


Something went wrong.