Lays Profile
Lays

@_L4ys

Followers
4K
Following
10K
Statuses
2K

Co-Founder @TrapaSecurity & @pwnabletw/ MSRC Top 100 2019&2020 / Mobile & Windows Security

台灣
Joined January 2015
Don't wanna be here? Send us removal request.
@_L4ys
Lays
8 months
A bit late, but here's the talk I gave last year at CODE BLUE and HITCON, about the 20+ Trend Micro Apex One LPE that @0x000050 and I disclosed.
Tweet media one
7
30
135
@_L4ys
Lays
3 days
RT @sarperavci: Just launched CTF Search with 24k+ CTF writeups, covering everything from web exploitation to reverse engineering. Check it…
0
307
0
@_L4ys
Lays
10 days
RT @itswillis: Two new posts from @tiraniddo today: on reviving a memory trapping primitive from his 2021 post.…
0
90
0
@_L4ys
Lays
10 days
RT @LiveOverflow: I guess somebody was thinking outside... the... sand... box! "Compromised renderer can control your mouse and escape sb…
0
30
0
@_L4ys
Lays
11 days
RT @wiz_io: BREAKING: Internal #DeepSeek database publicly exposed 🚨 Wiz Research has discovered "DeepLeak" - a publicly accessible ClickH…
0
859
0
@_L4ys
Lays
14 days
RT @hasherezade: In case if you wonder what broke #ProcessHollowing on Windows 11 24H2, I have something for you:
0
299
0
@_L4ys
Lays
14 days
RT @ryotkak: I published a blog post about six vulnerabilities in Git/GitHub-related projects. They all result in credential leakage when c…
0
37
0
@_L4ys
Lays
19 days
RT @hackermondev: Research into a unique 0-click deanonymization exploit targeting Signal, Discord and hundreds of platform 🧵 https://t.co/…
0
537
0
@_L4ys
Lays
21 days
RT @filip_dragovic: Seems that new windows update bring some changes in NTFS as its no longer possible to delete folders with ::$INDEX_ALLO…
0
37
0
@_L4ys
Lays
21 days
RT @l33d0hyun: Amazing... He is a real hacker.
0
88
0
@_L4ys
Lays
23 days
RT @lcamtuf: Investigating an "evil" RJ45 dongle:
0
21
0
@_L4ys
Lays
24 days
RT @th3anatomist: Unintended consequences from compiler bugs can cause service shutdowns, loss of funds, and other critical issues - even w…
0
1
0
@_L4ys
Lays
25 days
@0x4d5aC Nice research! You might also be interested in my previous research on Trend Micro's IPC mechanism and LPE
@_L4ys
Lays
8 months
A bit late, but here's the talk I gave last year at CODE BLUE and HITCON, about the 20+ Trend Micro Apex One LPE that @0x000050 and I disclosed.
Tweet media one
1
2
16
@_L4ys
Lays
25 days
RT @0x4d5aC: Intro blogpost with details of the TrendMicro LPE vulnerability (Named Pipe Replay) just went live!
0
16
0
@_L4ys
Lays
28 days
RT @AzakaSekai_: Don't believe everything you read on the internet - the said "malware" is literally just an SFX driver installer for the C…
0
161
0
@_L4ys
Lays
1 month
RT @orange_8361: The detailed version of our #WorstFit attack is available now! 🔥 Check it out! 👉 cc: @_splitline_
0
212
0
@_L4ys
Lays
1 month
RT @0x4d5aC: Slides for our talk "The Key to COMpromise" (AV/EDR privilege escalation) are on GitHub. If you want to discuss this stuff, y…
0
82
0
@_L4ys
Lays
1 month
RT @gynvael: Want to support security researchers from Dragon Sector in covering legal costs piling up after they went public with logic bo…
0
56
0
@_L4ys
Lays
2 months
RT @FuzzySec: I have posted the slides for the talk @chompie1337 and I gave this past weekend at @h2hconference -> The Kernel Hacker’s Guid…
0
226
0
@_L4ys
Lays
2 months
RT @08Tc3wBB: iOS 17 PoC, Here’s how u can leak any iCloud app data by copying and pasting two completely unrelated files.
0
29
0
@_L4ys
Lays
3 months
RT @SzJadczak: Co tu się dzieje? Poseł PiS Andrzej Adamczyk mówi w kontekście grupy Dragon sector, która ujawniła machinacje przy pociągach…
0
152
0