Xenon
@XenonOracle
Interested in Vulnerability Research/Exploit development.Did Web Bug bounties in the past https://hackerone.com/xenonoracle
Browser
Joined July 2023
Xenon reposted
Dive deep into Arm Firmware, learn reverse engineering essentials with Ghidra, Unicorn, AFL++, and Fuzzware on Tobias Scharnowski and Marius Muench's 32 hour virtual course, August 19-25: ringzer0.training/doubledown24-f…
0
4
12
0
949
Xenon reposted
I'm very excited to finally share the first part of the research I did into Ghostscript. This post details the exploitation of CVE-2024-29510, a classic format string bug, which we abuse to bypass the SAFER sandbox and gain RCE. codeanlabs.com/blog/research/…
3
92
266
111
31K
United States Trends
- 1. Iowa 25.7K posts
- 2. Dante Moore 2,614 posts
- 3. Indiana 40.9K posts
- 4. Penn State 24.9K posts
- 5. Mendoza 22.3K posts
- 6. Heisman 10.5K posts
- 7. Gus Johnson 7,640 posts
- 8. #UFCVegas111 7,463 posts
- 9. Mizzou 4,778 posts
- 10. Atticus Sappington N/A
- 11. #GoDucks 2,559 posts
- 12. Sayin 70.9K posts
- 13. #kufball N/A
- 14. UConn 4,229 posts
- 15. Sounders 1,004 posts
- 16. Cam Coleman N/A
- 17. #iufb 4,645 posts
- 18. Fran Brown N/A
- 19. Lance Leipold N/A
- 20. Preston Howard N/A
Loading...
Something went wrong.
Something went wrong.