The two bytes that make size matter:
Reverse engineering Apple's iOS 0-click CVE-2025-43300 improved bounds checking fix, by Madimodi Diawara
blog.quarkslab.com/patch-analysis…
My new article: "Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel"⚡️
I tell a bug collision story and introduce my pet project kernel-hack-drill, which helped me to exploit the hard bug that received @PwnieAwards 2025
a13xp0p0v.github.io/2025/09/02/ker…
The issue in WhatsApp seems to be a logic vulnerability and appears to target users who have iMessage turned off, in order to trigger the ImageIO vulnerability.
The issue in WhatsApp seems to be a logic vulnerability and appears to target users who have iMessage turned off, in order to trigger the ImageIO vulnerability.
CVE-2025-55177, an authorization bypass in WhatsApp on iOS and Mac, allowed attackers to force "content from arbitrary URL" to be rendered on a target’s device..
A zero-click vulnerability recently patched by Apple (CVE-2025-43300) was also used in the WhatsApp attack 👀
After wrestling with a mess of decompiled pseudocode, we wrote a short analysis of CVE-2025-43300. In a twist of irony, we also show how we stumbled on another DNG parsing bug that was supposed to be fixed a few months ago.
github.com/DarkNavySecuri…
This post demonstrates how bugs aren't always what they seem, especially when working with a decompiled version of the code. Compiler optimization or decompiler artifacts can mask or "fix" high-level code issues. #Apple#macOS#iOSafine.com/reverse-engine…
🚨 New blog post: ELEGANTBOUNCER - Catch iOS 0-click exploits without having the samples.
Features iOS backup forensics & messaging app scanning for iMessage, WhatsApp, Signal, Telegram & Viber attachments.
🔗 Link -> msuiche.com/posts/elegantb…
While reproducing the iOS ITW CVE-2025-43300 (support.apple.com/en-us/124925), we accidentally triggered another old DNG image parsing vulnerability. The analysis is still ongoing.
New blog post just dropped!
West Shepherd breaks down extending the Mythic Poseidon agent for ARM64 Dylib injection on Apple Silicon. Details include:
✅ Shellcode construction
✅ Memory allocation
✅ Runtime patching
✅ Thread creation
Read more ⤵️ ghst.ly/41Nu4ED
I diffed RawCamera on iOS 18.6.1 and 18.6.2
Here's full Diaphora diff: mediafire.com/file/e2yp7m27r…
18.6.1: 1DD8A36DC
18.6.2: 1DD8A3684
I'm concern that the exploit may using CGImageSource and CGImageSourceCreateImageAtIndex since it got removed on lastest version
As promised Blogpost is here!
I find that a lot of the times people ask “how can researchers find complex bugs”
This is my small contribution to show how the journey looked for me.
I presented this content at hitcon last week!
bughunters.google.com/blog/580034147…
@theori_io's AIxCC CRS has already found dozens of 0day vulnerabilities, and we've barely scratched the surface! The best part: it's open source, so there's no secrets to hide (at least in the AIxCC version 😉)!
So, how does our CRS actually find these 0days? 🧵
So, how did our #AIxCC finalist RoboDuck actually pull it off?
🦆 Building Effective LLM Agents - theori.io/blog/building-…
🦆 Exploring Traces - theori.io/blog/exploring…
Check out the full details and real execution logs on how we designed an AI that can find and fix…
3K Followers 1K FollowingMobile Security R&D by day | Saudi nationalist politician by night, whose ambition is to see his country 🇸🇦 lead the region #the_saudi_cyber_arms_company_2035
5K Followers 9 FollowingPaged Out! is a free magazine about programming, hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other amazing topics.
6K Followers 60 FollowingVulnerability researcher at ZDI (views are my own). Check #hosselot_tips for vulnerability research tips. 'A machine never faults. It reflects human's faults.'
35K Followers 255 FollowingWe help secure the world’s most targeted organizations and products. We combine security research with an attacker mentality to reduce risk and fortify code.
670 Followers 284 FollowingIn kernel space no one can hear you scream! The Android kernel guy at SAFA Team, proud @SpamAndHex dropout.
We are hiring: https://t.co/UPcIOeusrM