Neodyme Profile Banner
Neodyme Profile
Neodyme

@Neodyme

Followers
5K
Following
352
Statuses
315

We secure software with deep-dive audits, cutting-edge research, and in-depth trainings. Secure your solana program with Riverguard @ https://t.co/VmxVHzx2U2 ๐Ÿž๏ธ๐Ÿ’‚

Germany
Joined August 2021
Don't wanna be here? Send us removal request.
@Neodyme
Neodyme
1 year
Introducing Riverguard ๐Ÿž๏ธ๐Ÿ’‚ A new security tool for Solana program deployers... ๐Ÿงต
Tweet media one
13
71
90
@Neodyme
Neodyme
7 days
๐ŸชIntroducing HyperHook! ๐Ÿช A harnessing framework for snapshot-based #fuzzing using Nyx. โš’๏ธ HyperHook simplifies guest-to-host communication & automates repetitive tasks, making snapshot-fuzzing easier & more efficient! ๐Ÿ”— Read more:
1
6
9
@Neodyme
Neodyme
14 days
๐Ÿ”ŽPart 2 of our COM hijacking series is live! This time, we discuss a vulnerability in AVG Internet Security, where we bypass an allow-list, disable self-protection, and exploit an update mechanism to escalate privileges to SYSTEM ๐Ÿš€๐Ÿ’ป
1
15
46
@Neodyme
Neodyme
22 days
We made it to the news... ๐Ÿ“ฐ
@lastweekinfosec
Last Week in Security (LWiS)
22 days
Windows LPE (@MrAle_98), CLR OPSEC (@passthehashbrwn), WinRM BOFs (@falconforceteam), Bitlocker bypass (@Neodyme), and more!
2
0
5
@Neodyme
Neodyme
26 days
From startups to large companies, we've seen this setup used by many corporate clients in the wild. Here's why this is so difficult to fix and Microsoft has not changed the exploitable default settings yet:
Tweet media one
0
1
9
@Neodyme
Neodyme
28 days
Following our #38c3 talk about exploiting security software for privilege escalation, we're excited to kick off a new blog series! ๐ŸŽŠ Check out our first blog post on our journey to ๐Ÿ’ฅ exploit five reputable security products to gain privileges via COM hijacking:
1
22
74
@Neodyme
Neodyme
2 months
0
0
2
@Neodyme
Neodyme
2 months
Want to support independent research like this? Consider delegating to our validator. Your support helps us keep delivering top-quality insights without compromise:
0
0
11
@Neodyme
Neodyme
3 months
๐Ÿ’ฅWhen security software itself becomes a target! ๐Ÿ’ฅ Learn how we've uncovered critical vulnerabilities in Wazuh, turning a powerful security tool into an unexpected attack vector. ๐Ÿ‘‰ Read more about the findings:
0
7
12
@Neodyme
Neodyme
4 months
Since we had used a different setup without any administrator account, our official attempt during #Pwn2Own failed. However, @thezdi provided us with a second chance to present our Lexmark exploit and it worked ๐Ÿ–จ๏ธ๐ŸŽ‰
Tweet media one
2
2
24
@Neodyme
Neodyme
4 months
RT @D_K_Dev: After a great #Pwn2Own with @Neodyme , I would like to share some insights I gained when working with the AeoTec Smart Home Huโ€ฆ
0
16
0
@Neodyme
Neodyme
4 months
While some of our colleagues were at the #itsaexpo in Nuremberg, our team who traveled to Cork successfully completed the #SOHOSmashup category at #Pwn2Own! We've responsibly disclosed the vulnerabilities we found. Big thanks to @thezdi for organizing this amazing event!
@thezdi
Trend Zero Day Initiative
4 months
Our final SOHO Smashup of Day 2 ends with a partial collision. Neodyme (@Neodyme) used 4 bugs, including a stack-based buffer overflow, in their successful demonstration, but 1 bug had previously been used in the contest. They earn $21,875 and 8.75 Master of Pwn points. #Pwn2Own
Tweet media one
1
0
9
@Neodyme
Neodyme
4 months
gg, this should fit nicely into our new office ๐Ÿ–จ๏ธ We'll be looking to complete the set tomorrow by attacking Lexmark CX331adwe at 3pm in the printers category and QNAP QHora-322 and Canon imageCLASS MF656Cdw at 5pm in the SOHO category. See you there!
@thezdi
Trend Zero Day Initiative
4 months
Confirmed! Team Neodyme (@Neodyme) used a stack-based buffer overflow to exploit the HP Color LaserJet Pro MFP 3301fdw printer. The earn $20,000 and 2 Master of Pwn points. #Pwn2Own #P2OIreland
3
5
25
@Neodyme
Neodyme
4 months
Challenge accepted! Weโ€™re gearing up for @thezdi's #Pwn2Own to highlight critical vulnerabilities in home routers and printers. Today at 11am IST, weโ€™ll be targeting the HP Color LaserJet Pro MFP 3301fdw. Fingers crossed and good luck to the other contestants๐Ÿคž
1
3
18
@Neodyme
Neodyme
4 months
We audited @UNCX_token's liquidity lockers toward the end of Q2 2024 -- and we're happy to celebrate their launch! We can confirm that their audit completed without a single finding above low severity -- an uncommon feat. Their dedication to securing their programs is unmatched ๐Ÿซก
@UNCX_token
UNCX Network
4 months
Our Liquidity Lockers are now live on @solana, offering enhanced security and verifiable open-source integration for projects. Lock liquidity on @RaydiumProtocol to protect token value, minimize volatility, and increase investor confidence. All accounts are decentralized, immutable, and secure. Secure your SOL project now! ๐Ÿ”’
0
3
13