We are excited to announce our FIRST course "how to pick a newsletter topic that requires large quantities of your time but only has a target demographic of ~2k people....101"
We are excited to announce our FIRST course "how to pick a newsletter topic that requires large quantities of your time but only has a target demographic of ~2k people....101"
We hope everyone is recovering from there 4 day hangover. Here is a new EC to get you through the week 👇
Blind OOB Read to Auth Bypass from @0x_shaq@GoogleVRP w/ a practical RETBLEED Exploit
LLM traces from AIxCC w/ @theori_io
+ Jobs and MORE 👇
blog.exploits.club/exploits-club-…
We are on a brief hiatus this week - hate to miss a week (especially after we bragged about not missing weeks...last week) but we will make next weeks extra long just for you
Me: AI could never make a better vuln researcher than me
Also me:
(ps: newsletter out in an hour - I'm totally NOT procrastinating reviewing weekly job postings rn. I swear)
Schrodinger's bug:
When you statically identify what looks like a bug but you're too afraid to try and trigger it dynamically for fear you're wrong.
Can't wait to use this community to put all the terrible posts saved in my drafts folder
Welcome to all the new followers from our shitpost. If you were uninformed...we are a newsletter, and today is NEWSLETTER DAY baybeee 📰
On-device Android Fuzzing from @FuzzySec@S1r1u5_ talks AI for hacking
Google CTF Crypto chals from @mystiz613
ITW Chrome Bugs from…
And sooner or later as you progress you understand that the days when something looks promising are good days in themselves. First rule of exploit club: we don't talk about the days where you hop functions one by one and can't generate a single valuable idea about them.
And sooner or later as you progress you understand that the days when something looks promising are good days in themselves. First rule of exploit club: we don't talk about the days where you hop functions one by one and can't generate a single valuable idea about them.
REMINDER - the EC x @vector35 Binary Ninja giveaway ends tomorrow ‼️ Don't forget to sign-up to the newsletter for your chance at winning a FREE personal license
REMINDER - the EC x @vector35 Binary Ninja giveaway ends tomorrow ‼️ Don't forget to sign-up to the newsletter for your chance at winning a FREE personal license
766 Followers 705 FollowingAdvance-sec platform: is one of the top leaders in research and acquisition of vulnerabilities and 0day exploits.
Email: [email protected]
Wire: @advance_sec
3K Followers 343 FollowingSecurity Engineer @ Cloudflare,
ex-Google ISE,
I use bad software and bad machines for the wrong things.
My writing: https://t.co/Z7uucr5BYW
19K Followers 2K Following🔬Founder & CEO @Binarly_io, #codeXplorer, #efiXplorer, @REhints and "Rootkits and Bootkits" book. Previously worked at Nvidia, Cylance, Intel, ESET, Yandex.
11K Followers 666 Following12+ years journey in security research. Ai / Blockchain engineer, occasional startups CTO. CS PhD candidate. I build and break stuff, sometimes in public.
874 Followers 71 FollowingAn open-eyed man falling into the well of weird warring state machines. I talk about reverse engineering, vulnerability research and exploit development.
3K Followers 258 FollowingSecurity Engineer @ Google, likes fuzzing, static analysis and VR.
The opinions stated here are my own, not those of my company.
12K Followers 24 FollowingAn annual awards ceremony celebrating and making fun of the achievements and failures of security researchers and the wider security community.
13K Followers 5K Followingex @Microsoft Security Researcher| Vulnerability Research | Threat Intel | EASM | DE | Penetration Tester | Opinions here are solely mine not my employer
7K Followers 783 FollowingSecurity engineer at https://t.co/027VXUlgOx. Focusing on the Linux kernel. Maintaining @linkersec. Trainings at https://t.co/D5MrxmYimS.
3K Followers 495 FollowingLeader of the Zero Day Initiative. Pwn2Own organizer and adjudicator. Trafficker of export-controlled intrusion software. Bug Hunter.
5K Followers 315 FollowingSecurity but not as in "national security". Playing CTFs with @redrocket_ctf (and @Sauercl0ud). Pwn2Own Vancouver 2020..=2024\{2023}. @[email protected]
961 Followers 0 FollowingThis account is inactive, use the following instead:
- https://t.co/V1HC4hS2oJ
- https://t.co/8xth5l1Rn8
- https://t.co/BPuGer3Owz
2K Followers 4 FollowingSecurity consulting and vulnerability research services for a mobile connected world. | We find needles in your software haystack.