HackSys Team
@HackSysTeam
Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning
You might like
🚨 We're hiring! 🚨 Hi everyone! HackSys Inc. is seeking an enthusiastic **Vulnerability Researcher** (Windows/Android/Browser) to join our team full-time — here in India! 🇮🇳🛡️ 👀 What we’re looking for: - Approximately **2+ years of experience** in hands-on vulnerability…
Made a pwn challenge for this year’s HITCON CTF, which required participants to bypass PAC, BTI, and deal with relative vtables. Here’s the write-up: bruce30262.github.io/hitcon-ctf-202… Check it out if you're interested🙂
I posted a short blog about how a Samsung GPU vulnerability (CVE-2025-21479) can be leveraged for an LPE on affected devices xploitbengineer.github.io/CVE-2025-21479
xploitbengineer.github.io
Exploiting CVE-2025-21479 on a Samsung S23
Motivation A couple of years ago, I picked up a few of Samsung S23’s at Pwn2Own.
It’s time to publish the blog post about the bug that won at P2O Berlin 2025. Enjoy! With this post, I mark my last moment as a researcher at @oobs_io. I’m moving on to a new place for a fresh start.🔥🦎 oobs.io/posts/four-byt…
Recently attended an amazing Windows Kernel Exploitation training at @_c0c0n_ by @HackSysTeam's Ashfaq Ansari! 🔥 Ashfaq was an incredible trainer - made complex kernel concepts easy to grasp. Also won the CTF! 🏆 Big thanks to Ashfaq and HackSysTeam! 🙏
Bidding farewell to one of the last Windows kernel address leaks, CVE-2025-53136 (KASLR bypass). Sometimes, even patches can open new doors for exploitation. crowdfense.com/nt-os-kernel-i…
Check out our newest blog about how we took advantage of a WebGPU feature to turn an integer underflow bug into an arbitrary read in Chrome’s WebGPU. This bug was fixed by Google long ago, but our ticket is still restricted. qriousec.github.io/post/oob-angle/ by @lanleft_ + @__suto
Last weekend, I participated in corCTF and solved the Android Pwn challenge - corphone. It was a great challenge, and I learned a lot from it. Here's my write-up :) u1f383.github.io/android/2025/0…
My new article: "Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel"⚡️ I tell a bug collision story and introduce my pet project kernel-hack-drill, which helped me to exploit the hard bug that received @PwnieAwards 2025 a13xp0p0v.github.io/2025/09/02/ker…
Part 1 of my article series on fine-tuning an LLM for analysis of massive amounts of Intel Processor Trace is up. Use cases: codebase vulnerability scan, at-scale bug triage, etc. With thanks to @33y0re, @ivanrouzanov, and @vGPUArthur: alansguigna.com/2025/08/using-…
Exploit and mini writeup for CVE-2025-5419. github.com/mistymntncop/C…
New blog post: A journey in Android physical memory - writeup on exploiting recent GPU bug CVE-2025-21479 dawnslab.jd.com/android_gpu_at…
Learn how Buttercup works under the hood: blog.trailofbits.com/2025/08/08/but…
The problem described in your JSON would potentially be exploitable, with some factors depending like whats in the buffer and what you control - have a look at this repo and some tutorials, setup a machine to debug - github.com/hacksysteam/Ha…
3 Day Hand-on Training – Advanced Windows Kernel Exploitation Take a deep dive into Windows kernel internals, Fuzzing, privilege escalation, & advanced exploitation techniques. More details: c0c0n.org #infosec #CyberSecurity #SecurityConference #hacker #exploit
Looks like @BlueHatIL talks are online now, so here’s my talk for anyone who wanted to learn about the latest episode of KASLR and couldn’t make it: youtu.be/Dk2rLO2LC6I
youtube.com
YouTube
BlueHat IL 2025 - Yarden Shafir - Look, Ma—No Privileges! How Windows...
@typhooncon is already over, but we enjoyed every minute ! During our talk "Journey To Freedom", we disclosed for the first time the details on the Windows LPE we used at Pwn2Own Vancouver 2024 after escaping from VirtualBox. Slides are already available: reversetactics.com/publications/2…
#OffensiveCon25 videos are now up! youtube.com/playlist?list=…
🚨 Recently Discovered Windows Kernel Vulnerability 🚨 We've published an advisory for a severe Local Privilege Escalation in dxkrnl.sys, which has been patched by Microsoft. 🛡️ CVE-2025-29812 🔗 Complete advisory: hacksys.io/advisories/HI-… 🎥 Demo video: youtu.be/y5urzgTQZN0…
youtube.com
YouTube
Microsoft Windows dxgkrnl Untrusted Pointer Dereference Local...
DirectX Graphics Kernel Elevation of Privilege Vulnerability msrc.microsoft.com/update-guide/v…
Code reuse in the age of kCET and HVCI by @slowerzs blog.slowerzs.net/posts/keyjumpe…
United States Trends
- 1. Justin Fields 9,250 posts
- 2. Jets 66.1K posts
- 3. Patriots 142K posts
- 4. Drake Maye 18.6K posts
- 5. Jalen Johnson 5,106 posts
- 6. Henderson 21.1K posts
- 7. #FinallyOverIt N/A
- 8. AD Mitchell 2,278 posts
- 9. Judge 180K posts
- 10. Pats 14K posts
- 11. Diggs 10.1K posts
- 12. Cal Raleigh 7,346 posts
- 13. #criticalrolespoilers 2,218 posts
- 14. #TNFonPrime 3,298 posts
- 15. Santana 13.5K posts
- 16. #GreysAnatomy 2,052 posts
- 17. Mike Vrabel 5,824 posts
- 18. Summer Walker 8,860 posts
- 19. Purdue 8,906 posts
- 20. #TNAiMPACT 5,743 posts
You might like
-
offensivecon
@offensive_con -
Project Zero Bugs
@ProjectZeroBugs -
REhints
@REhints -
Samuel Groß
@5aelo -
Axel Souchet
@0vercl0k -
Ivan Fratric 💙💛
@ifsecure -
kmkz
@kmkz_security -
Pavel Yosifovich
@zodiacon -
Rasta Mouse
@_RastaMouse -
b33f | 🇺🇦✊
@FuzzySec -
Niklas B
@_niklasb -
ϻг_ϻε
@steventseeley -
Cedric Halbronn
@saidelike -
itszn
@itszn13 -
Sinaei
@Intel80x86
Something went wrong.
Something went wrong.