
SYSPWN
@syspwnx
SysPWN : A place to learn more about Vulnerability Research and make yourself ready for world-class hacking competitions
CVE-2025-59362 Squid Web Proxy Cache 7.1-VCS - snmp message processing stack based buffer-overflow github.com/Microsvuln/adv…
We released our Fuzzilli-based V8 Sandbox fuzzer: github.com/googleprojectz… It explores the heap to find interesting objects and corrupts them in a deterministic way using V8's memory corruption API. Happy fuzzing!
Prior to Pwn2Own Automotive 2024, ZDI posted a number of articles outlining the attack surfaces of the devices part of the competition. In the EV charger space compared to IVIs, there is quite limited public research although this has been changing recently.…
The top skill a vulnerability researcher can have is persistence.
Refreshing our technical deep dive into DNS exploitation which is still very relevant. Watch and learn how we uncover the entire process of finding and exploiting a vulnerability in a DNS parser. From zero to exploit, it's all here. Part1: youtu.be/xWoQ-E8n4B0
youtube.com
YouTube
DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)
Here’s the talk I did for @syspwnx in the past as well if you missed it: m.youtube.com/watch?v=uBu9B0…
youtube.com
YouTube
SysPWN Session 1 : Alex Plaskett on Vulnerability Research and...
The recording of the second session of SysPWN with @RabbitPro from @FlashbackPwn on PWN2OWN Hacking Game is up on youtube! youtube.com/watch?v=qAn6B4… Sorry for delay in uploading! we were quite busy! Enjoy it!
youtube.com
YouTube
SysPWN Session 2: Radek Domanski from FlashBack team on PWN2OWN...
We're live now! cispa-de.zoom.us/meeting/638925…
Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! cispa-de.zoom-x.de/j/63892507646?…

We're live now! cispa-de.zoom.us/meeting/638925…
Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! cispa-de.zoom-x.de/j/63892507646?…

We'll be live in about 1 hour from now with @RabbitPro to learn from his experiences of Vulnerability Research for #PWN2OWN contests! Come and see awesome content from @FlashbackPwn Flashback team ! #SYSPWN #VulnerabilityResearch
Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! cispa-de.zoom-x.de/j/63892507646?…

I will be talking about our experience playing Pwn2Own games, what kind of vulns together with @pedrib1337 we have been finding and I will provide a bit more technical details about 2 selected ones. Tune in especially if you consider p2o in the future 👇
Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! cispa-de.zoom-x.de/j/63892507646?…

Join us tomorrow (November 9, 16:30 CEST) with Another SysPWN Event with @FlashbackPwn team presenting "Pwn2Own, Hacking game" to see how they successfully found and exploited multiple vulnerabilities in different system for competing at Pwn2Own contest! cispa-de.zoom-x.de/j/63892507646?…

📢📢📢Thrilled to announce @FlashbackPwn's presence in our upcoming #syspwn event on November 9, 2023, at 16:30 CEST! Radek (@RabbitPro) will discuss his pwn2own experiences, preparation, and how they tackled challenges in vulnerability research for #pwn2own contests!
📢📢📢 Excited to announce that we'll have FlashBack team @FlashbackPwn in our next session of SysPWN . @FlashbackPwn will present how they PWNed devices at PWN2OWN competitions . Stay tuned for our next announcement about the date and time of this event!
The recording of our session with @alexjplaskett on Vulnerability research and team building strategies for PWN2OWN competitions is up now! youtu.be/uBu9B0tNObs Enjoy it! #SYSPWN #PWN2OWN #Hacking #VulnerabilityResearch
youtube.com
YouTube
SysPWN Session 1 : Alex Plaskett on Vulnerability Research and...
Enjoy the session with Alex Plaskett! you can learn a ton from him .
The recording of our session with @alexjplaskett on Vulnerability research and team building strategies for PWN2OWN competitions is up now! youtu.be/uBu9B0tNObs Enjoy it! #SYSPWN #PWN2OWN #Hacking #VulnerabilityResearch
youtube.com
YouTube
SysPWN Session 1 : Alex Plaskett on Vulnerability Research and...
Alex released the great presentation he gave yesterday at @syspwnx . Again, we're grateful to @alexjplaskett and @NCCGroupInfosec for accepting our invitation and this contribution. The recording of the session will be available soon as well!
I have just released my slides for "VR for Pwn2" from @syspwnx talk I gave yesterday. Covering general P2O/VR experience, SoHo Smash-Up Ubiquiti and Lexmark printers. research.nccgroup.com/2023/08/11/sys…
Slides from @alexjplaskett talk at @syspwnx have now been released: research.nccgroup.com/2023/08/11/sys… Covering vulnerability research for Pwn2Own, Soho-smashup and printer vulns.
United States 趨勢
- 1. #LoveYourW2025 103K posts
- 2. Good Wednesday 20.6K posts
- 3. #wednesdaymotivation 4,752 posts
- 4. #Worlds2025 47.2K posts
- 5. And the Word 75.1K posts
- 6. Hump Day 7,551 posts
- 7. Raila Odinga 150K posts
- 8. #LeeKnowXGucci 5,371 posts
- 9. LEE KNOW FOR HARPERS BAZAAR 4,691 posts
- 10. #Wordle1579 N/A
- 11. Young Republicans 87.6K posts
- 12. Tami 4,855 posts
- 13. Baba 123K posts
- 14. Yamamoto 51.2K posts
- 15. Lucia 57.6K posts
- 16. Vishnu 9,084 posts
- 17. halsey 9,983 posts
- 18. George Floyd 36.6K posts
- 19. Politico 327K posts
- 20. Burl Ives 1,797 posts
Something went wrong.
Something went wrong.