0xor0ne
@0xor0ne.bsky.social
1.1K followers 20 following 450 posts
| CyberSecurity | Reverse Engineering | C and Rust | Exploit | Linux kernel | PhD | Only My Opinions :) |
Posts Media Videos Starter Packs
0xor0ne.bsky.social
3-parts series on vulnerability research and exploitation of the SMB3 Linux Kernel Server (ksmbd)

Part 1: blog.doyensec.com/2025/01/07/k...
Part 2: blog.doyensec.com/2025/09/02/k...
Part 3: blog.doyensec.com/2025/10/08/k...

#infosec
0xor0ne.bsky.social
Exploiting a libANGLE offset integer underflow read the Chrome WebGPU heap

qriousec.github.io/post/oob-angle

#infosec
0xor0ne.bsky.social
Worldline Yomani XR payment terminal reverse-engineering and security analysis

stefan-gloor.ch/yomani-hack

#embedded #infosec
0xor0ne.bsky.social
Exploiting vulnerabilities in Supermicro BMC (CVE-2025-7937 and CVE-2025-6198)

www.binarly.io/blog/broken-...

Credits Anton Ivanov

#infosec
0xor0ne.bsky.social
Analysis of GrapheneOS hardened malloc libc allocator

www.synacktiv.com/en/publicati...

Credits Nicolas Stefanski

#infosec
0xor0ne.bsky.social
Flipping the R/W bit in the page table entry of a mapped file to gain write access

ptr-yudai.hatenablog.com/entry/2025/0...

#Linux #infosec
0xor0ne.bsky.social
Exploiting CVE-2024-50264, a Linux kernel UAF vulnerability due to a race condition in AF_VSOC sockets

a13xp0p0v.github.io/2025/09/02/k...

#infosec #Linux
0xor0ne.bsky.social
Reliable Linux system call interception

blog.mggross.com/intercepting...

#cybersecurity #Linux
0xor0ne.bsky.social
Practical guide to fuzzing the Binder kernel driver using the Linux Kernel Library (LKL)

androidoffsec.withgoogle.com/posts/binder...

Credits Eugene Rodionov, Gulshan Singh and Zi Fan Tan

#infosec #android
0xor0ne.bsky.social
Reverse engineering and decryption of Synology encrypted archives

www.synacktiv.com/en/publicati...

Credits Théo Fauché

#infosec
0xor0ne.bsky.social
Security analysis of Sonoff Smart Home IoT devices (CVE-2024-7205 and CVE-2024-7206)

jerinsunny.github.io/blogs/iotsec...

Credits Jerin Sunny and Shakir Zari

#iot #infosec
Hacking Sonoff Smart Home IoT Device
CVE-2024-7206: Firmware extraction and Hardware SSL Pinning Bypass
jerinsunny.github.io
0xor0ne.bsky.social
Porting a Mali GPU exploit to Pixel 6 Pro (CVE-2023-48409)

starlabs.sg/blog/2025/06...

#cybersecurity #mobile
0xor0ne.bsky.social
"Challenges and Pitfalls while Emulating Six Current Icelandic Household Routers"

Evaluation of different tools for routers firmware emulation
(FACT, QEMU, EMUX, Qiling, Firmadyne, FAT, FirmAE, Pandawan, and EMBA)

skemman.is/bitstream/19...

#cybersecurity #embedded
0xor0ne.bsky.social
GDB over a serial connection for debugging the kernel on a Pixel 8

xairy.io/articles/pix...

#infosec
0xor0ne.bsky.social
FiberGateway GR241AG: root code execution through public wifi network

r0ny.net/FiberGateway...

#infosec #embedded
0xor0ne.bsky.social
FiberGateway GR241AG home router: exploitation chain

r0ny.net/FiberGateway...

#infosec #embedded
0xor0ne.bsky.social
Linux ELF symbols resolution and obfuscation

blog.elmo.sg/posts/breaki...

#infosec #Linux
0xor0ne.bsky.social
Thermomix TM5 reverse engineering and exploitation

www.synacktiv.com/en/publicati...

#cybersecurity #iot
0xor0ne.bsky.social
Getting started with Linux kernel exploitation (slide)

"Linux Kernel Exploitation for Beginners" by Kevin Massey:
rvasec.com/slides/2025/...

"Control Flow Hijacking in the Linux Kernel" by Valeriy Yashnikov
pt-phdays.storage.yandexcloud.net/Yashnikov_Va...

#Linux #infosec