![Krzysztof Okupski Profile](https://pbs.twimg.com/profile_images/1431237612631625737/Ifhg5Olj_x96.jpg)
Krzysztof Okupski
@exminium
Followers
280
Following
73
Statuses
38
Embedded security, reverse engineering and software exploitation
Joined August 2021
RT @kiqueNissim: The AMD #Sinkclose exploit has been published for the #ekoparty presentation @exminium @IOActive @ekoparty => https://t.co…
0
23
0
RT @ekoparty: "AMD Sinkclose: Universal Ring -2 Privilege Escalation" dictada por @kiqueNissim y @exminium I Sala E - MainTrack #EKO2024 🔥…
0
6
0
RT @hexacon_fr: Recordings of the #HEXACON2024 talks have been uploaded to our YouTube channel 🎬 See you next yea…
0
42
0
RT @droogie1xp: New blog post: Tales from the Call-Gate: An SMM Supervisor Vulnerability @kiqueNissim
0
24
0
Our talk on AMD Sinkclose got accepted at Ekoparty! I'll see you all there 🍺 @kiqueNissim #EKO2024
0
1
6
RT @hexacon_fr: AMD Sinkclose: Universal Ring -2 Privilege Escalation by IOActive #HEXACON2024
0
5
0
RT @hexacon_fr: "AMD Sinkclose: Universal Ring -2 Privilege Escalation" 💍 by Enrique E Nissim & Krzysztof Okupski
0
2
0
RT @a_greenberg: At Defcon tomorrow, researchers will reveal a flaw in hundreds of millions of AMD chips they call "Sinkclose," which would…
0
363
0
RT @kiqueNissim: Super excited to be presenting the AMD Sinkclose vulnerability, a universal way into SMM: @exmini…
0
41
0
RT @jmartijnb: More news, as I already told many last weekend / week, my team is expanding to Amsterdam! So if you want to do Offensive res…
0
11
0
@NikolajSchlej The parser was primarily developed to find and extract the PEI firmware volume. It'd be great if UEFITool could do that too!
0
0
0