لا توجد نتائج لـ "#exploitdev"

CVE-2025-52915 assigned - my first vulnerability!🥳 A classic BYOVD case: kernel driver with unrestricted process termination. Vendor coordination turned out more challenging than the exploit itself. Technical write-up: blacksnufkin.github.io/posts/BYOVD-CV… #ExploitDev #CVE #BYOVD #RedTeam


"Those who gaze into the assembler, take care that the assembler does not gaze also into them." The silicon souls whisper their secrets... github.com/h3xorc1sm/digi… #DEFCON #ExploitDev #DigitalDemonology


🔔 Reminder: Zürich, Corelan Stack is coming Oct 7–10, 2025 ✅ No nonsense, No BS ✅ Just real-world exploit dev skills 🎟️ eventcreate.com/e/sigs-corelan… 💛 RT appreciated! #corelan #win11 #exploitdev


🔔 Reminder: Zürich, Corelan Stack is coming Oct 7–10, 2025 ✅ No nonsense, No BS ✅ Just real-world exploit dev skills 🎟️ eventcreate.com/e/sigs-corelan… 💛 RT appreciated! #corelan #win11 #exploitdev


🇦🇺 Corelan hits Melbourne for the FIRST time! 💥 Stack Exploit Dev: Feb 3–6, 2026 🧨 Heap Masterclass: Feb 9–12, 2026 🎯 w/ @TantoSecurity 🧠 Real skills. No fluff. 💣 Come prepared. 🕐 Early bird ends Sept 2025 👉 bit.ly/corelan-traini… #Corelan #ExploitDev


🇦🇺 Corelan hits Melbourne for the FIRST time! 💥 Stack Exploit Dev: Feb 3–6, 2026 🧨 Heap Masterclass: Feb 9–12, 2026 🎯 w/ @TantoSecurity 🧠 Real skills. No fluff. 💣 Come prepared. 🕐 Early bird ends Sept 2025 👉 bit.ly/corelan-traini… #Corelan #ExploitDev


Built my own 64-bit ELF packer — something I always wanted to try. XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment github.com/0x3xploit/entr… #Linux #ELF #Exploitdev #ReverseEngineering #RedTeam #BinaryAnalysis #infosec

Pratham68200440's tweet image. Built my own 64-bit ELF packer — something I always wanted to try.
XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment
github.com/0x3xploit/entr…

#Linux #ELF #Exploitdev #ReverseEngineering  #RedTeam #BinaryAnalysis #infosec
Pratham68200440's tweet image. Built my own 64-bit ELF packer — something I always wanted to try.
XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment
github.com/0x3xploit/entr…

#Linux #ELF #Exploitdev #ReverseEngineering  #RedTeam #BinaryAnalysis #infosec
Pratham68200440's tweet image. Built my own 64-bit ELF packer — something I always wanted to try.
XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment
github.com/0x3xploit/entr…

#Linux #ELF #Exploitdev #ReverseEngineering  #RedTeam #BinaryAnalysis #infosec

8. 🔥 Maddie Stone Google Project Zero star. Finds zero-days in Android and the wild. Her writeups are art. Keeps pressure on vendors to fix fast. A bug-hunting sniper for the common good. #exploitdev #zeroday


If you're exploiting a driver offering R/W access to physical memory on Win11 24H2, you can leverage this simple trick to circumvent kernel address leak restrictions and retrieve the kernel base address :p xacone.github.io/kaslr_leak_24h… #exploitdev #driverexploitation


🇧🇪 Belgian Roots. Global Impact. 🌍 Corelan delivers world-class exploit dev training for Windows: 🔹 Stack Smashing 🔹 Heap Masterclass Built in Europe. Respected worldwide. Sign up 👉 bit.ly/corelan-traini… #CyberSecurity #ExploitDev #MadeInBelgium


🇧🇪 Belgian Roots. Global Impact. 🌍 Corelan delivers world-class exploit dev training for Windows: 🔹 Stack Smashing 🔹 Heap Masterclass Built in Europe. Respected worldwide. Sign up 👉 bit.ly/corelan-traini… #CyberSecurity #ExploitDev #MadeInBelgium


Pwned Minishare 1.4.1 via Vanilla Stack-based buffer overflow! #exploitdev #osed

xCipher007's tweet image. Pwned Minishare 1.4.1 via Vanilla Stack-based buffer overflow! #exploitdev #osed
xCipher007's tweet image. Pwned Minishare 1.4.1 via Vanilla Stack-based buffer overflow! #exploitdev #osed

This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation exploitation.ashemery.com

binaryz0ne's tweet image. This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com
binaryz0ne's tweet image. This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com
binaryz0ne's tweet image. This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com

Hand-crafted ROP chain 🛠️! Had limited gadgets, so I used an IAT entry for HeapAlloc and calculated the VirtualAllocStub RVA offset. Got creative without ASLR and possibly should've used a read primitive. Details in the gist! #ROP #ExploitDev #osed gist.githubusercontent.com/snowcra5h/a7c1…

tetsuoai's tweet image. Hand-crafted ROP chain 🛠️! Had limited gadgets, so I used an IAT entry for HeapAlloc and calculated the VirtualAllocStub RVA offset. Got creative without ASLR and possibly should've used a read primitive. Details in the gist! #ROP #ExploitDev #osed 

gist.githubusercontent.com/snowcra5h/a7c1…

I’m happy to announce that I passed OSED from @offsectraining 😍😍 I just got the email and man IT FELT SO GOOD #CyberSecurity #exploitdev

emiratic0der's tweet image. I’m happy to announce that I passed OSED from @offsectraining 😍😍 I just got the email and man IT FELT SO GOOD 
#CyberSecurity #exploitdev

It's truly beautiful.🥹Avoiding bad characters, compensating for limited gadgets. It's like crafting a piece of art🎨. Challenges like this make the #OSED so rewarding!💪Got any tricks up your sleeve? Share them with me. Friday is exam day. #ExploitDev #ArtInCode #infosecurity

tetsuoai's tweet image. It's truly beautiful.🥹Avoiding bad characters, compensating for limited gadgets. It's like crafting a piece of art🎨. Challenges like this make the #OSED so rewarding!💪Got any tricks up your sleeve? Share them with me. Friday is exam day. #ExploitDev #ArtInCode #infosecurity

Mastering buffer overflows in Vulnserver is essential for exploit development. WinDBG aids in debugging vulnerabilities by controlling EIP and generating shellcode. A must-learn for secure environments! 🔍⚙️ #ExploitDev #BufferOverflow link: ift.tt/fFk6AGK

TweetThreatNews's tweet image. Mastering buffer overflows in Vulnserver is essential for exploit development. WinDBG aids in debugging vulnerabilities by controlling EIP and generating shellcode. A must-learn for secure environments! 🔍⚙️ #ExploitDev #BufferOverflow

link: ift.tt/fFk6AGK

All the Assembly and #RE labs have now been shared. I just need to find the reference to the Crackme(s) I used and then it should be 100% complete. #Offsec #ExploitDev #SoftwareExploitation exploitation.ashemery.com

binaryz0ne's tweet image. All the Assembly and #RE labs have now been shared. I just need to find the reference to the Crackme(s) I used and then it should be 100% complete. #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com

And we did it ! 🙌🏽 We brought the great @corelanc0d3r to teach a master class of exploit development for the first time in Brazil and Latin America. 😎 Many thx Peter for this amazing experience. #exploitdev #redteam #gohacking #corelan #cyber

laios_barbosa's tweet image. And we did it ! 🙌🏽

We brought the great @corelanc0d3r to teach a master class of exploit development for the first time in Brazil and Latin America. 😎

Many thx Peter for this amazing experience. 

#exploitdev #redteam #gohacking #corelan #cyber
laios_barbosa's tweet image. And we did it ! 🙌🏽

We brought the great @corelanc0d3r to teach a master class of exploit development for the first time in Brazil and Latin America. 😎

Many thx Peter for this amazing experience. 

#exploitdev #redteam #gohacking #corelan #cyber

I really enjoy teaching private classes! Even if you're just a small group (min. 4), willing to travel to Belgium, we can make it happen! I still have some timeslots in November & December. DM if interested @corelanconsult #windows #exploitdev #corelan #nevergiveup

corelanc0d3r's tweet image. I really enjoy teaching private classes! Even if you're just a small group (min. 4), willing to travel to Belgium, we can make it happen!  I still have some timeslots in November & December. DM if interested @corelanconsult #windows #exploitdev #corelan #nevergiveup

Officially #OSED certified! I've conquered the Windows User Mode Exploit Development exam and earned the Offensive Security Exploit Developer (OSED) certification. Huge thanks to @offsectraining! #ExploitDev #ReverseEngineering #TryHarder

xbz0n's tweet image. Officially #OSED certified! I've conquered the Windows User Mode Exploit Development exam and earned the Offensive Security Exploit Developer (OSED) certification. Huge thanks to @offsectraining! #ExploitDev #ReverseEngineering #TryHarder

Interested in Software Exploitation? This course is for you and will take you from knowing nothing, to understanding how exploits work and how to write them... I hope it will be useful to someone out there! #Offsec #Cybersecurity #ExploitDev #Debugging youtube.com/watch?v=5GGyFb…

binaryz0ne's tweet image. Interested in Software Exploitation? This course is for you and will take you from knowing nothing, to understanding how exploits work and how to write them... I hope it will be useful to someone out there!
#Offsec #Cybersecurity #ExploitDev #Debugging

youtube.com/watch?v=5GGyFb…

Bypassing PIE with partial overwrite? 🔥 Instead of guessing full addresses, just overwrite specific bytes to align with predictable offsets. Precision > brute force. A reminder that security evolves, and so must we. 🛡️ #CyberSecurity #ExploitDev #ReverseEngineering

Paul__ige's tweet image. Bypassing PIE with partial overwrite? 🔥 Instead of guessing full addresses, just overwrite specific bytes to align with predictable offsets. Precision > brute force. A reminder that security evolves, and so must we. 🛡️
#CyberSecurity #ExploitDev #ReverseEngineering
Paul__ige's tweet image. Bypassing PIE with partial overwrite? 🔥 Instead of guessing full addresses, just overwrite specific bytes to align with predictable offsets. Precision > brute force. A reminder that security evolves, and so must we. 🛡️
#CyberSecurity #ExploitDev #ReverseEngineering

This week was the last public class of 2023, we’re already filling up the agenda for 2024. However, we still have some timeslots for private classes. (either at your company or in Belgium, for small groups). Interested? DM for info! #corelan #exploitdev #windows11 #stack #heap

corelanc0d3r's tweet image. This week was the last public class of 2023, we’re already filling up the agenda for 2024.  However, we still have some timeslots for private classes. (either at your company or in Belgium, for small groups). Interested? DM for info! #corelan #exploitdev #windows11 #stack #heap

YES! 🔥 The legendary Corelan (@corelanc0d3r) exploit development training is happening in ROME! 🇮🇹 Absolutely stoked about this opportunity right here in Italy. Time to level up those #ExploitDev skills! 💪 #Corelan #CyberSecurity #InfoSec #Reversing #Rome #Hacking #Cyber

BSidesRoma's tweet image. YES! 🔥 The legendary Corelan (@corelanc0d3r) exploit development training is happening in ROME! 🇮🇹 Absolutely stoked about this opportunity right here in Italy. Time to level up those #ExploitDev skills! 💪
#Corelan #CyberSecurity #InfoSec #Reversing #Rome #Hacking #Cyber

ONE more chance this year to take our popular Bootcamp. High-quality materials, real class, real instructor (AND the perfect prep for our heap exploitation class). Seats are selling fast! What are you waiting for?  deep-conference.com/predeep-bootca…  #corelan#windows11 #exploitdev

corelanc0d3r's tweet image. ONE more chance this year to take our popular Bootcamp.  High-quality materials, real class, real instructor (AND the perfect prep for our heap exploitation class).  Seats are selling fast!  What are you waiting for?  deep-conference.com/predeep-bootca…  #corelan#windows11 #exploitdev

Built my own 64-bit ELF packer — something I always wanted to try. XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment github.com/0x3xploit/entr… #Linux #ELF #Exploitdev #ReverseEngineering #RedTeam #BinaryAnalysis #infosec

Pratham68200440's tweet image. Built my own 64-bit ELF packer — something I always wanted to try.
XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment
github.com/0x3xploit/entr…

#Linux #ELF #Exploitdev #ReverseEngineering  #RedTeam #BinaryAnalysis #infosec
Pratham68200440's tweet image. Built my own 64-bit ELF packer — something I always wanted to try.
XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment
github.com/0x3xploit/entr…

#Linux #ELF #Exploitdev #ReverseEngineering  #RedTeam #BinaryAnalysis #infosec
Pratham68200440's tweet image. Built my own 64-bit ELF packer — something I always wanted to try.
XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment
github.com/0x3xploit/entr…

#Linux #ELF #Exploitdev #ReverseEngineering  #RedTeam #BinaryAnalysis #infosec

Think kernel bugs are too deep to reach? Think again. 🔥 At #NullconBerlin2025, dive headfirst into a hands-on Linux kernel exploitation with security researcher Andrey Konovalov — no prior kernel knowledge required. Know More: nullcon.net/berlin-2025/tr… #LinuxKernel #ExploitDev

nullcon's tweet image. Think kernel bugs are too deep to reach? Think again. 🔥

At #NullconBerlin2025, dive headfirst into a hands-on Linux kernel exploitation with security researcher Andrey Konovalov — no prior kernel knowledge required.

Know More: nullcon.net/berlin-2025/tr…

#LinuxKernel #ExploitDev

Loading...

Something went wrong.


Something went wrong.


United States Trends