jeffssh's profile picture. Forever standing on the shoulders of giants

jeff

@jeffssh

Forever standing on the shoulders of giants

Pinned

I have completed the FORCED ENTRY RCE + SBX chain with a PAC bypass. The calculator payload can be found here: github.com/jeffssh/CVE-20…. I learned a lot about iOS exploitation and can't wait to share that in a blog post, which I'll release along with the code to generate this PDF.


jeff reposted

We really should be talking about this more....KASLR is just not working properly on Android right now, and it hasn't for a long time. googleprojectzero.blogspot.com/2025/11/defeat…


jeff reposted

As the operator of a soup kitchen, I don’t see why I should be expected to fix health code violations people report. After all, we are run almost entirely by volunteers


jeff reposted

OMG.. whatsapp 0c in pwn2own

l33d0hyun's tweet image. OMG.. whatsapp 0c in pwn2own

jeff reposted

Pointer leaks through pointer-keyed data structures googleprojectzero.blogspot.com/2025/09/pointe…


jeff reposted
xvonfers's tweet image.

jeff reposted

Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application. ibm.com/think/x-force/…


jeff reposted

I'm thrilled to announce that my talk Ghost Calls: Abusing Web Conferencing for Covert Command & Control was accepted to #BHUSA 2025 (CC: @BlackHatEvents) blackhat.com/us-25/briefing…


jeff reposted

Dammit, that's a typo and I can't edit the post. Well anyway project-zero.issues.chromium.org/issues/42451725


jeff reposted

V8 Sandbox escape/bypass/violation and VR collection github.com/xv0nfers/V8-sb…


jeff reposted

Pwndbg 2025.01 is out! It adds official LLDB support including support for macOS and Mach-O binaries, improved performance, enhanced embedded debugging & many more! Also, want to support us or buy us a coffee? See our GH sponsors: github.com/sponsors/pwndbg github.com/pwndbg/pwndbg/…


jeff reposted

Allocating new exploits Pwning browsers like a kernel & Digging into PartitionAlloc and Blink engine phrack.org/issues/71/10.h…


Excited to be back at DEFCON!

jeffssh's tweet image. Excited to be back at DEFCON!

jeff reposted

I've been reverse engineering the xz backdoor this weekend and have documented the payload format and written a proof-of-concept exploit for the RCE. The payloads are signed with an ED448 key, so I patched my own key into the backdoor for testing. :-) github.com/amlweems/xzbot

amlweems's tweet image. I've been reverse engineering the xz backdoor this weekend and have documented the payload format and written a proof-of-concept exploit for the RCE. The payloads are signed with an ED448 key, so I patched my own key into the backdoor for testing. :-)

github.com/amlweems/xzbot

Rough copy of the FORCEDENTRY code is now available. Most relevant code is here: github.com/jeffssh/CVE-20… Blog soon!


jeff reposted

Does See No Eval deserve some kind of Most Underrated Research nomination?


jeff reposted

they’re called 0days because ive found 0 of them


jeff reposted
Malwarebytes's tweet image.

Loading...

Something went wrong.


Something went wrong.