Search results for #ExploitDev
CVE-2025-52915 assigned - my first vulnerability!🥳 A classic BYOVD case: kernel driver with unrestricted process termination. Vendor coordination turned out more challenging than the exploit itself. Technical write-up: blacksnufkin.github.io/posts/BYOVD-CV… #ExploitDev #CVE #BYOVD #RedTeam
🧩 Context Engineering: inside our self-evolving exploit agent How did we boost reliability and achieve cost-effective performance in exploit generation? 👉 team-atlanta.github.io/blog/post-cont… #DARPA #DEFCON #AICyberChallenge #Cybersecurity #LLM #GenAI #Agent #Fuzzing #ExploitDev
Privilege escalation isn't always about the shell. Kernel memory leaks can offer direct paths to root access. Details: versprite.com/blog/the-shell… #PrivilegeEscalation #LinuxSecurity #ExploitDev
"Those who gaze into the assembler, take care that the assembler does not gaze also into them." The silicon souls whisper their secrets... github.com/h3xorc1sm/digi… #DEFCON #ExploitDev #DigitalDemonology
We dissect a DFG compiler bug we discovered in Safari/WebKit. This post covers root cause, impact, and technical analysis: blog.exodusintel.com/2025/08/04/oop… #WebKit #VulnerabilityResearch #ExploitDev #Safari #CyberSecurity #ExodusIntel
🔔 Reminder: Zürich, Corelan Stack is coming Oct 7–10, 2025 ✅ No nonsense, No BS ✅ Just real-world exploit dev skills 🎟️ eventcreate.com/e/sigs-corelan… 💛 RT appreciated! #corelan #win11 #exploitdev
🔔 Reminder: Zürich, Corelan Stack is coming Oct 7–10, 2025 ✅ No nonsense, No BS ✅ Just real-world exploit dev skills 🎟️ eventcreate.com/e/sigs-corelan… 💛 RT appreciated! #corelan #win11 #exploitdev
🚨 Blog 6 is out! Jay Pandya breaks down Out-Of-Bounds in Windows kernel drivers—how it works, how it breaks, and why it matters. Read it now via White Knight Labs: whiteknightlabs.com/2025/07/01/und… #Infosec #WindowsKernel #CyberSecurity #ExploitDev
✅ Completed Exploit Vulnerabilities 🧩 Tasks: 5 🔥 Streak: 5 Sharpened my skills on finding and exploiting common vulnerabilities. #TryHackMe #CyberSecurity #InfoSec #EthicalHacking #CTF #StudentHacker #BugBounty #HackThePlanet #ExploitDev #VulnerabilityResearch #CyberSkills
Working through HeapLab to sharpen my #glibc heap exploitation skills. Would love to connect with others learning this! DMs open if you're down to trade notes, debug together, or just chat #pwn. #BinaryExploitation #HeapExploitation #CTF #InfoSec #ExploitDev #CyberSecurity
🇦🇺 Corelan hits Melbourne for the FIRST time! 💥 Stack Exploit Dev: Feb 3–6, 2026 🧨 Heap Masterclass: Feb 9–12, 2026 🎯 w/ @TantoSecurity 🧠 Real skills. No fluff. 💣 Come prepared. 🕐 Early bird ends Sept 2025 👉 bit.ly/corelan-traini… #Corelan #ExploitDev
🇦🇺 Corelan hits Melbourne for the FIRST time! 💥 Stack Exploit Dev: Feb 3–6, 2026 🧨 Heap Masterclass: Feb 9–12, 2026 🎯 w/ @TantoSecurity 🧠 Real skills. No fluff. 💣 Come prepared. 🕐 Early bird ends Sept 2025 👉 bit.ly/corelan-traini… #Corelan #ExploitDev
Built my own 64-bit ELF packer — something I always wanted to try. XOR encrypts the .text section with a dynamic key and injects a custom stub in new PT_LOAD segment github.com/0x3xploit/entr… #Linux #ELF #Exploitdev #ReverseEngineering #RedTeam #BinaryAnalysis #infosec
🚨 My PoC was used in Trend Micro’s latest report on the Langflow vulnerability and Flodric botnet attacks! 🧠⚔️ Read it here 👇 🔗 trendmicro.com/en_us/research… #CyberSecurity #PoC #Langflow #RCE #Botnet #ExploitDev #BugBounty #RedTeam #TrendMicro
8. 🔥 Maddie Stone Google Project Zero star. Finds zero-days in Android and the wild. Her writeups are art. Keeps pressure on vendors to fix fast. A bug-hunting sniper for the common good. #exploitdev #zeroday
🇧🇪 Belgian Roots. Global Impact. 🌍 Corelan delivers world-class exploit dev training for Windows: 🔹 Stack Smashing 🔹 Heap Masterclass Built in Europe. Respected worldwide. Sign up 👉 bit.ly/corelan-traini… #CyberSecurity #ExploitDev #MadeInBelgium
🇧🇪 Belgian Roots. Global Impact. 🌍 Corelan delivers world-class exploit dev training for Windows: 🔹 Stack Smashing 🔹 Heap Masterclass Built in Europe. Respected worldwide. Sign up 👉 bit.ly/corelan-traini… #CyberSecurity #ExploitDev #MadeInBelgium
Red Teaming | Exploit Development with Assembly and C |MSAC+ Dive into reverse engineering! 🚀 Learn Assembly, Ghidra, & build exploits. Master shellcode & reverse engineering skills. #ReverseEngineering #ExploitDev #Cybersecurity #eduquill eduquill.com/red-teaming-ex…
💥 Push, Pop, Boom. Corelan Stack isn’t just another course — it’ll make things click. Expert-level stack exploitation. Zero fluff, real deal. “The course filled in gaps I didn’t even know I had.” — Fabio, Brazil 👉 bit.ly/corelan-traini… #corelan #stack #exploitdev

Florian Hansemann @CyberWarship
84K Followers 47 Following Father, Founder @HanseSecure, Pentesting, Student, ExploitDev, Redteaming, InfoSec & CyberCyber; -- Mastodon: https://t.co/KFSKYUN98M
SANS Offensive Operat... @SANSOffensive
71K Followers 583 Following More Offensive Than Ever #PenTest | #PurpleTeam | #RedTeam | #ExploitDev Training, Certification, and Research
CyberDevHq @thecyberdevhq
1K Followers 648 Following Offensive Kernel Engineer | #RedTeam Ops | Evangelist | #SecurityResearcher | #KernelSecurity #ExploitDev
0xBAADF00D @ExploitDev
9 Followers 21 Following
ExploitDev @3XploitDev
7 Followers 23 Following
d4rk0 @d4rk0s
1K Followers 179 Following c:c++ javascript php python asm:ir exploitdev reverser science animals space . publicwork phpstress sets:fsattack . private i2pdev deceni netdev
Prabhat Singh @exploitdev0
3 Followers 6 Following
†ϲΘѓѓΘՏїΘл... @c0rr0s10n
723 Followers 551 Following || #Security #Guru, #Vulnerability #Researcher in thirst of #Knowledge. War is an art, so welcome to the canvas. || #Intelligence #OffensiveSecurity #ExploitDev
ExploitDev @ExploitDll
0 Followers 1 Following