j00ru//vx Profile Banner
j00ru//vx Profile
j00ru//vx

@j00ru

Followers
38,424
Following
828
Media
16
Statuses
1,308

(Mostly) Windows hacker & vulnerability researcher. Google Project Zero. @DragonSectorCTF

Switzerland
Joined April 2010
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@j00ru
j00ru//vx
4 years
Today I'm happy to release new research I've been working on for a while: 0-click RCE via MMS in all modern Samsung phones (released 2015+), due to numerous bugs in a little-known custom "Qmage" image codec supported by Skia on Samsung devices. Demo:
22
761
2K
@j00ru
j00ru//vx
6 years
In summary of the last ~1.5 years of my work, I wrote a comprehensive whitepaper on the limitations of C language, kernel infoleaks, Bochspwn Reloaded and many related topics. It's out now! Thanks to all involved. Feels good 😎
@benhawkes
Ben Hawkes
6 years
Project Zero blog: "Detecting Kernel Memory Disclosure – Whitepaper" by @j00ru -
1
257
487
13
486
1K
@j00ru
j00ru//vx
6 years
Meet BrokenType – the font fuzzing toolset that helped me find 39 vulns in the Windows kernel and user-mode Uniscribe library in 2015-2017. It includes a font mutator, generator and loader. Now on GitHub:
4
505
1K
@j00ru
j00ru//vx
6 years
I've released an archive of the 13 low-level challenges I developed for CTFs organized with @DragonSectorCTF in 2014-2018, mostly Windows/Linux pwning. This includes task binaries, write-ups and exploits. I hope it'll entertain some more hackers 💻
5
392
984
@j00ru
j00ru//vx
6 years
New blog post: Exploiting a Windows 10 PagedPool off-by-one overflow (WCTF 2018).
1
344
525
@j00ru
j00ru//vx
4 years
The final part 5 of my Samsung MMS exploit blog series is out 🎉 It covers bypassing Android 10 ASLR and getting RCE. Also comes with the exploit source code!
3
226
500
@j00ru
j00ru//vx
6 years
The Windows syscall tables from my blog are now on GitHub, updated with Windows 10 1803 and formatted as CSV/JSON for easier use in software. Enjoy!
3
263
453
@j00ru
j00ru//vx
6 years
My Infiltrate slides about recent progress in Windows kernel infoleak detection: Topics covered: • Windows x64 instrumentation • Leaks to file systems • Double-write conditions • Visual Studio .pdb heap disclosure
2
244
453
@j00ru
j00ru//vx
5 years
I'd assume PE parsing in the Windows kernel would be well tested but surprisingly no, five such bugs were fixed last Patch Tuesday, all found by fuzzing. They crashed the OS as soon as they'd be written to disk or worst case viewed in Explorer. Details:
10
218
449
@j00ru
j00ru//vx
4 years
At last, the series begins: MMS Exploit Part 1: Introduction to the Samsung Qmage Codec and Remote Attack Surface. I'm excited to start sharing more about this work, starting with a deep dive into the internals and history of the codec.
3
223
452
@j00ru
j00ru//vx
6 years
In an effort to share more of my source code publicly, I've uploaded Bochspwn Reloaded (the kernel infoleak detector) to GitHub. For those interested, it may shed some light on the implementation details of the project. See:
3
225
429
@j00ru
j00ru//vx
7 years
I'm happy and honored to be listed #1 on this year's @msftsecurity researcher list. :) Congratulations to everyone who made it there.
Tweet media one
30
42
426
@j00ru
j00ru//vx
4 years
With Windows 10 20H1 (2004) almost out the door, I've updated the system call tables on my blog and on GitHub. Delta-wise, this seems to be the biggest Windows 10 update yet: +7 syscalls in ntoskrnl and +64,-6 in win32k.sys
5
140
424
@j00ru
j00ru//vx
5 years
This weekend, I updated the Windows syscall tables on my blog and GitHub () with the upcoming Windows 10 1903 (19H1). There's one new ntoskrnl syscall – NtCreateCrossVmEvent (STATUS_NOT_IMPLEMENTED), with 8 removed and 24 added in win32k since 1809.
2
184
392
@j00ru
j00ru//vx
6 years
For those interested in coverage-guided fuzzing, I've just released CmpCov - an instrumentation module for clang/SanitizerCoverage, which breaks down CMP/strcmp()/etc. into bytes and writes the extra coverage data to standard .sancov files. Get it here:
2
174
364
@j00ru
j00ru//vx
7 years
Announcing Bochspwn Reloaded – a new kernel memory infoleak detector – and the REcon Montreal 2017 slides.
4
279
333
@j00ru
j00ru//vx
5 years
I'm very happy to be ranked #9 on this year's @msftsecurity researcher list at #BHUSA2019 , which makes it the fifth year in top 10. Hats off to everyone else on the list! 😀
Tweet media one
14
18
296
@j00ru
j00ru//vx
5 years
I've released the reports of 20 bugs found in Microsoft DirectWrite in the handling of OpenType fonts. They are in the P0 tracker as usual: . The 10 most important ones were fixed in Patch Tuesday yesterday, the rest were closed as vNext.
2
120
272
@j00ru
j00ru//vx
4 years
This week: MMS Exploit Part 2: Effective Fuzzing of the Qmage Codec
1
128
269
@j00ru
j00ru//vx
5 years
I've digged up some ancient versions of Adobe Reader to figure out exactly which symbols were public in which builds and when. Turns out all the core modules had them at some point. My full analysis on the P0 blog:
3
101
258
@j00ru
j00ru//vx
4 years
Trying hard to keep up the weekly cadence of the MMS series. Today we're finally moving to exploitation, starting with finding a good bug and building RCE/ASLR 🔮 primitives. Enjoy! MMS Exploit Part 3: Constructing the Memory Corruption Primitives,
1
126
252
@j00ru
j00ru//vx
7 years
Here's a short story on how patches introduced exclusively in Windows 10 may affect the security of Windows 7 and 8 by exposing 0-day bugs.
@benhawkes
Ben Hawkes
7 years
Project Zero blog: "Using Binary Diffing to Discover Windows Kernel Memory Disclosure Bugs" by @j00ru -
5
272
380
5
197
247
@j00ru
j00ru//vx
7 years
The joy of ancient font driver code... this is by far the most crazy/strange KASLR bypass I've ever found. It's a shame this & related issue will never be fixed on Windows 7 and 8.
@ProjectZeroBugs
Project Zero Bugs
7 years
Windows Kernel ATMFD.DLL NamedEscape 0x2511 pool address derivation from entropy accumulator
1
24
51
4
132
242
@j00ru
j00ru//vx
9 years
Owning Adobe Reader and the Windows Kernel with a single font bug - slides and other details of my research are out http://t.co/sFeaEqCfbT
6
327
237
@j00ru
j00ru//vx
5 years
DrSancov, another tiny tool I've been finding useful lately. It's a DynamoRIO plugin which mimics the output of ASAN and SanitizerCoverage, so that you can easily plug in a closed-source app into a fuzzing framework expecting a typical open-source target.
0
98
231
@j00ru
j00ru//vx
5 years
Are you interested in font security? I've just updated my BrokenType repository () with several new tools: font2pdf (embedding custom fonts in PDFs), a DirectWrite API testing harness and a Windows FontSub.dll loader. Enjoy :)
0
71
230
@j00ru
j00ru//vx
5 years
In the vein of sharing pieces of my toolset, here's another one: a super thin PE loader for Linux, based on the pe-parse library. Worked for the Windows font subsetter, may work for other self-contained DLLs.
1
92
228
@j00ru
j00ru//vx
4 years
In July, there is a lot going on for the security of Android image decoding, so I recommend installing this month's update ASAP. This includes a DNG memory corruption in all modern Androids, and further issues in Samsung's Qmage codec. Both rated critical and reachable via MMS.
4
78
230
@j00ru
j00ru//vx
5 years
The BabyKernel Windows exploitation challenge from last week's @DragonSectorCTF is up on GitHub:
0
78
226
@j00ru
j00ru//vx
6 years
Achievement unlocked – found my first compiler vuln. is a 3 kB heap memory disclosure in .PDB symbols generated by Visual Studio. Use updated PDBCopy with the -CVE-2018-1037 flag to check and fix your public symbols. More details to follow soon. :)
2
63
221
@j00ru
j00ru//vx
7 years
I've just updated the Windows syscall tables on my blog with data from Windows 10 build 1703. Quite a few interesting changes and additions.
6
98
213
@j00ru
j00ru//vx
7 years
The syscall tables on my blog were just updated with Windows 10 Fall Creators Update. The velocity of win32k changes is getting out of hand
Tweet media one
3
141
211
@j00ru
j00ru//vx
5 years
Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!
0
77
201
@j00ru
j00ru//vx
8 years
Slides about my Windows Metafile research (Ruxcon, PacSec) and fuzzing (Black Hat EU) are now public, see .
2
168
192
@j00ru
j00ru//vx
3 years
Fixed this month: CVE-2021-26863, a race condition/use-after-free in win32k.sys demonstrating @tiraniddo 's excellent Memory Access Trapping technique in Windows (). It was a fun exercise to do some auditing in search of the specific code pattern.
@ProjectZeroBugs
Project Zero Bugs
3 years
Windows Kernel win32k UAF of the PDEVOBJ object via a race condition in NtGdiGetDeviceCapsAll
0
30
86
1
71
191
@j00ru
j00ru//vx
8 years
Windows system call tables updated, refreshed and reworked. Now include Win10 1507/1511/1607, among other changes.
0
172
187
@j00ru
j00ru//vx
4 years
This week's episode: MMS Exploit Part 4: MMS Primer, Completing the ASLR Oracle
Tweet media one
0
79
182
@j00ru
j00ru//vx
5 years
Not sure if this is common knowledge, but I recently learned about Windows Server Core and suddenly running Windows in VMs/Bochs for research (instrumentation/fuzzing) became much more convenient. It's a lightweight/stripped down version of regular Windows with (almost) no GUI.
3
46
178
@j00ru
j00ru//vx
7 years
I've just derestricted a new unpatched Windows 7-10 kernel pool pointer leak: . It's an interesting instance of a "double-write" race condition during user/kernel interactions.
Tweet media one
3
106
182
@j00ru
j00ru//vx
8 years
New blog post: Windows user-mode exploitation trick – refreshing the main process heap.
3
163
179
@j00ru
j00ru//vx
5 years
This has bitten me twice now, so let me reiterate: if you do fuzzing on Windows with Application Verifier (PageHeap etc.), disable logging first: appverif -logtofile disable otherwise your target will start for seconds and then minutes due to linear search of a log file name 😬
3
36
175
@j00ru
j00ru//vx
6 years
The write-ups of 12 further x64-specific Windows kernel infoleaks fixed last week are now online: . I'll discuss their discovery in my upcoming @InfiltrateCon talk in April :)
Tweet media one
1
97
156
@j00ru
j00ru//vx
5 years
I uploaded my BadType challenge from last weekend's Dragon CTF Teaser on GitHub. It's a medium-difficulty RE task for Windows x64 (worth 400 pts), solved by 9⃣ teams during the competition.
1
36
151
@j00ru
j00ru//vx
8 years
New blog post! Disclosing stack data (stack frames, GS cookies etc.) from the default heap on Windows.
1
145
145
@j00ru
j00ru//vx
5 years
Summary of last Patch Tuesday: • 8 bugs in the Microsoft FontSub.dll library, • 2 bugs in AFDKO when converting documents in Adobe Acrobat, • 10 bugs in PDF rendering in Adobe Reader (mostly fonts and JP2K). Details and PoCs in the tracker:
2
39
144
@j00ru
j00ru//vx
5 years
Protip: using GitHub to search for random symbols from the audited software often pays off. It's surprising what you can find there. For example, when fuzzing the Windows FontSub.dll library, I found that some of the code was open-sourced as part of .NET:
1
29
144
@j00ru
j00ru//vx
5 years
If you wish to start fuzzing JPEG2000 images in PDF, I'd recommend @angealbertini 's mkimage script to embed them, with a few mods: • /JPXDecode filter • Removed /ColorSpace and /BitsPerComponent • Correct width/height, determined e.g. with "identify"
1
42
140
@j00ru
j00ru//vx
6 years
As promised last week, the details of the .PDB heap memory disclosure in Visual Studio (CVE-2018-1037) are now available at . Infoleaks are a really special breed of bugs, be it in kernel or user-mode 🐛
Tweet media one
2
85
133
@j00ru
j00ru//vx
7 years
If you like kernel security or the Bochspwn project, feel invited to my Bochspwn Reloaded talk at @reconmtl and @BlackHatEvents this summer.
Tweet media one
3
49
134
@j00ru
j00ru//vx
5 years
Let's try something new and document a bit of a failure😅 I briefly fuzzed the Windows t2embed.dll library (handles EOT fonts in e.g. PPTs in PowerPoint) and didn't find any significant bugs. Has it been beaten to death by efforts like ? :)
4
36
133
@j00ru
j00ru//vx
8 years
New blog post: Windows Kernel Local Denial-of-Service #1 : win32k!NtUserThunkedMenuItemInfo (Windows 7-10),
2
108
127
@j00ru
j00ru//vx
5 years
Just derestricted two Microsoft DirectWrite font bugs fixed yesterday, found with the harness I published recently. One shiny mem. disclosure only affected Edge, as Chrome and Firefox were protected by OTS, which doesn't allow EBDT/EBLC tables. Yay for attack surface reduction👏
Tweet media one
@ProjectZeroBugs
Project Zero Bugs
5 years
Microsoft DirectWrite out-of-bounds read in sfac_GetSbitBitmap while processing TTF fonts
0
15
33
1
28
123
@j00ru
j00ru//vx
5 years
I'm impressed by the detailed analysis of the sample minimization process, root cause and fix of one of the October Windows kernel PE parsing bugs, performed with REVEN. Great read! 🤓
@tetrane
Tetrane
5 years
Applying Timeless Analysis to the recent CVE-2019-1347: When a mouse over a file is enough to crash your system. Read our analysis and get your hands on the trace on our new demo platform.
1
49
99
1
29
122
@j00ru
j00ru//vx
4 years
GG! I pushed my Windows x64 pwnable binary together with a brief write-up and exploit code on GitHub:
@DragonSectorCTF
Dragon Sector
4 years
The Dragon CTF 2020 is now over! Congratulations to the winners: 🥇Perfect ⚔️ Guesser ( @pb_ctf + @GuesserSuper ) 🥈ALLES! ( @allesctf ) 🥉hxp ( @hxpctf ) Thanks to all participating teams, and to our prize sponsor, @SumoLogic ! Full scoreboard:
Tweet media one
2
18
72
1
27
123
@j00ru
j00ru//vx
7 years
The 30th Windows kernel infoleak found with Bochspwn was fixed last tuesday, this time in netio.sys. CVE-2017-8564,
0
80
119
@j00ru
j00ru//vx
8 years
At last, a new post on my blog. Check out a write-up on the discovery and exploitation of FreeType2 CVE-2014-2240 at
0
121
113
@j00ru
j00ru//vx
5 years
Does anyone know an IDA Pro plugin to create .pdb files based on function names and other symbols in the .idb? I've only found but nothing beyond that.
8
23
96
@j00ru
j00ru//vx
4 years
The fuzzing harness referenced in the report has also just been open-sourced at . I hope this makes it easy to reproduce my results and bootstrap further research into Qmage and potentially other proprietary Skia image codecs.
1
32
112
@j00ru
j00ru//vx
7 years
Final post in the series: Windows Kernel Local Denial-of-Service #5 : win32k!NtGdiGetDIBitsInternal (Windows 7-10),
0
86
102
@j00ru
j00ru//vx
8 years
Seems like I made it to both top 3 and 57 on this year's MSRC researcher list at #BHUSA . :)
Tweet media one
13
26
94
@j00ru
j00ru//vx
7 years
My bugs fixed by MS in the last Patch Tuesday (Windows Registry, GDI, GDI+, Uniscribe, ICM) are now unrestricted:
1
73
92
@j00ru
j00ru//vx
7 years
Another bug documented: Windows Kernel Local Denial-of-Service #4 : nt!NtAccessCheck and family (Windows 8-10), .
0
101
85
@j00ru
j00ru//vx
9 years
Last week's #44CON slides and details about further Windows kernel font vulnerabilities are out at http://t.co/vQPCnkBgVF.
2
65
79
@j00ru
j00ru//vx
8 years
This week's release: Windows Kernel Local Denial-of-Service #2 : win32k!NtDCompositionBeginFrame (Windows 8-10),
0
77
79
@j00ru
j00ru//vx
7 years
The x86 links are and , with an adequate change in the URL for 64-bit tables.
1
27
76
@j00ru
j00ru//vx
6 years
@AmarSaar Kudos for your #35C3 talk and the pwndb exploit, amazing work! For reference, I've uploaded my winworld exploit too: . I used RtlCaptureContext for the infoleak and a controlled std::string for arbitrary read/write, but the "gets" trick was very clever :)
1
15
77
@j00ru
j00ru//vx
8 years
Wow, looks like a few days ago @gynvael 's and my 5-year FFmpeg fuzzing effort hit 1500 fixes: $ git log | grep j00ru | grep -c Gynvael 1506
5
38
76
@j00ru
j00ru//vx
4 years
The bug report is now public at
@j00ru
j00ru//vx
4 years
For Samsung, there are new vulnerabilities in the custom Qmage codec fixed as SVE-2020-17675 (no CVE yet), which have similar severity to the Qmg bugs exploited in April. Full details in the P0 tracker are restricted until 90 days elapse under our 2020 disclosure policy trial.
1
2
27
0
27
75
@j00ru
j00ru//vx
7 years
Another post in the series: Windows Kernel Local Denial-of-Service #3 : nt!NtDuplicateToken (Windows 7-8),
0
59
73
@j00ru
j00ru//vx
5 years
Issue #1 is now public 🥳 Super happy for the crew and especially @gynvael who has founded and led the project. My contributions are "Windows Syscall Quiz" (ever heard of old IIS syscalls with IDs ≥ 0x2000?) and "Building ROP with floats and OpenType" :)
@gynvael
Gynvael Coldwind
5 years
Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! #PagedOut !
39
974
2K
0
11
73
@j00ru
j00ru//vx
6 years
Last week, Microsoft fixed the last 8 Windows kernel infoleaks found by Bochspwn Reloaded. Between April 2017-now, that's 67 CVEs assigned to disclosure of uninitialized memory. Shortly after @InfiltrateCon , I'll be releasing a whitepaper to wrap up this long-lived project. :)
0
19
66
@j00ru
j00ru//vx
4 years
I will be writing a longer piece on the Project Zero blog in the next month or two, discussing the discovery and especially exploitation of these issues. Until then, enjoy!😀
3
2
66
@j00ru
j00ru//vx
4 years
I have just derestricted issue #2002 in our tracker (), which contains a detailed report on the codec, the fuzzing process, and the crashes I have identified. It also includes a short "FAQ" section with some extra context.
2
19
66
@j00ru
j00ru//vx
5 years
I also took the chance to analyze all kernels starting with Windows NT4, and created a chart showing the progression of the syscall table sizes between 1996-2019 in visual form. Actually seeing the bigger picture of a ~2.5x growth is quite fascinating/scary.
Tweet media one
4
33
64
@j00ru
j00ru//vx
7 years
Slides (in Polish) for my kernel memory disclosure talk ("Automatyczne wykrywanie błędów ujawnienia pamięci jądra w systemach Windows i Linux") given at Security #PWNing Conference this week are now up at .
4
35
64
@j00ru
j00ru//vx
8 years
A detailed write-up on the ATMFD.DLL NamedEscape 0x250C pool corruption is now available in the P0 bug tracker: . :)
0
83
63
@j00ru
j00ru//vx
3 years
Congrats to the winners of this year's Dragon CTF, and the 5⃣ teams that solved my small Linux pwnable "Nim" challenge! As usual, I've uploaded my write-up and exploit on GitHub:
@DragonSectorCTF
Dragon Sector
3 years
Dragon CTF 2021 is officially over! Congratulations to the winners: 1. Balsn ( @balsnctf ) 2. organizers ( @0rganizers ) 3. More Smoked Leet Chicken ( @leetmore ) Thank you for playing - GG!
Tweet media one
3
13
88
4
13
59
@j00ru
j00ru//vx
9 years
Looking forward to discussing a full Adobe Reader XI + Windows 8.1 exploit chain using a single font vulnerability at the upcoming @reconmtl
6
58
62
@j00ru
j00ru//vx
9 years
@gynvael and I have just published the slides from our "Pwning with style" CTF talk. Check http://t.co/tvMedyb1c0 and http://t.co/vCTwTQgf7k
1
62
60
@j00ru
j00ru//vx
10 years
SECURE 2014 slide deck and Hex-Rays IDA Pro advisories published, see http://t.co/zQZT2VNIZQ
3
56
58
@j00ru
j00ru//vx
7 years
September MS Patch Tuesday roundup: 7 kernel infoleaks via Bochspwn and 2 stray TTF bugs in win32k. Reports open at
2
37
58
@j00ru
j00ru//vx
5 years
Paged Out Issue #1 is coming in the next few days, be sure to check it out!📄💥
@gynvael
Gynvael Coldwind
5 years
All articles for Paged Out! reviewed! Now we just need to finish the PDF-making scripts :) Expect Issue #1 to be out around DEF CON this week*. * Subject to Murphy's law
Tweet media one
3
17
102
0
7
57
@j00ru
j00ru//vx
7 years
In related news, I've just derestricted a bunch of NTFS filesystems infoleaks () fixed on last Patch Tuesday, along with two other disclosures at #1361 ,1362.
@j00ru
j00ru//vx
7 years
The video from my Black Hat USA 2017 talk on Bochspwn Reloaded (kernel memory disclosure detection project) is now on YouTube:
0
86
126
1
34
52
@j00ru
j00ru//vx
6 years
I also took the chance to clean up a bit and move the original Bochspwn (double fetch detector, 2013) repository from "kfetch-toolkit" to . I hope this makes it a bit less confusing and easier to find in the future :)
0
15
52
@j00ru
j00ru//vx
4 years
Fixes for these bugs started rolling out with the May update, and Samsung officially addressed them as SVE-2020-16747 (). For now, we have assigned CVE-2020-8899 collectively to all 5218 unique crashes we reported.
1
10
51
@j00ru
j00ru//vx
10 years
Just posted a few exploits for recent "pwning" CTF tasks on the official @DragonSectorCTF blog, see http://t.co/TFWYuaxNFV.
0
52
50
@j00ru
j00ru//vx
11 years
Windows Race Condition research is out! See "SyScan 2013, Bochspwn paper and slides" at http://t.co/eSQVp7CFf9 and http://t.co/ygicqyl6qB
14
98
51
@j00ru
j00ru//vx
4 years
Really loving this collaboration with font guru @abrax5 , who knows typography inside out, far beyond just the exploitation-specific bits. So much potential for learning from each other 🤓 and finding some cool multi-browser memory corruption bugs in the meantime!
@abrax5
Dominik Röttsches @[email protected]
4 years
With more powerful font formats, it's important to keep browsers and apps safe. @j00ru and I found a #vulnerability in #DirectWrite when processing variable fonts: RCE on visiting a page with a specially crafted font.
1
27
89
1
5
49
@j00ru
j00ru//vx
4 years
A direct link to the exploit is here: And a visualization of the ASLR bypass #3 mentioned in the post is shown in the GIF below (relevant frames 33-57):
0
9
45
@j00ru
j00ru//vx
11 years
My "Windows Kernel Trap Handler and NTVDM Vulnerabilities — Case Study" slide deck from #ZeroNights is up, see http://t.co/nOJ9JvjPfR.
3
68
46
@j00ru
j00ru//vx
11 years
Just updated all System Call and CSR API tables with Windows 2012/8/8.1 data on my blog, see http://t.co/PRxHfJczPG for details.
1
47
42
@j00ru
j00ru//vx
7 years
CVE-2017-0299, a minor Windows kernel infoleak, is finally patched for good. It's a case of a bad fix and working PoC public for 2 months.
2
18
41
@j00ru
j00ru//vx
8 years
Windows exploitation ninjas, there is a pwn500 task I created for the CTF which started ~2 hrs ago. Can you hack it?
0
39
43
@j00ru
j00ru//vx
4 years
On a related note, for those interested in the Qmg format and Android remote zero-click exploitation, I have some good news! The first post in the series is coming out very soon, with plans to publish each one ~weekly until the series is finished. 😀
1
2
43
@j00ru
j00ru//vx
8 years
Had a lot of fun solving this one. :-)
@__awe
Adrien Stoffel
8 years
Exploiting a misused C++ shared pointer on Windows 10 (solution to my Insomni'hack teaser winworld task)
2
138
154
0
14
41
@j00ru
j00ru//vx
7 years
Derestricted bugs from this month's early Microsoft update – four Windows kernel infoleaks and one pool buffer overflow in the infamous ATMFD NamedEscape interface:
0
25
41
@j00ru
j00ru//vx
11 years
New #0days in the wild. "A story of win32k!cCapString, or unicode strings gone bad." http://t.co/VdisDsWTF7
0
72
41