![Billy Ellis Profile](https://pbs.twimg.com/profile_images/1646556053511733249/Rez_vUhz_x96.jpg)
Billy Ellis
@bellis1000
Followers
22K
Following
21K
Statuses
30K
iOS security researcher
London, England
Joined November 2013
RT @S1r1u5_: Imagine opening a Discord message and suddenly your computer is hacked. We discovered a bug that made this possible and earne…
0
171
0
RT @mobilesecurity_: How Phys Puppet Exploits the iOS Kernel #MobileSecurity #iOSsecurity by @bellis1000
0
12
0
RT @i41nbeer: If you like memory corruption, low-level internals and building custom decompilers to analyse novel exploits check out the wr…
0
151
0
RT @hexacon_fr: Social events are needed from time to time 🥂 Thanks to @dfsec_com for being the exclusive sponsor of the #HEXACON2023 Soci…
0
5
0
RT @df_forensics: Our very first blog post: “iOS 17, new version, new acronyms” #iOS17 #DFF #sptm #txm
0
51
0
RT @AmarSaar: New blogpost - analysis of the ipc_kmsg_get_from_kernel vulnerability, patched in iOS 15.4 :) https:/…
0
127
0
Had a great time at #Zer0Con2022 this week. Highly recommend. Big thanks to the organisers @vangelis_at_POC @POC_Crew 🤝
2
3
49
@shogunpwnd The 0x10 read is 16, not 10. 0xA would be 10. So when you read 0x10, you’re reading 2x8 (2 8-byte pointers) :)
1
0
1