jeongoh Profile
jeongoh

@kkokkokye

Followers
160
Following
301
Statuses
576

researcher@theori

Republic of Korea
Joined May 2013
Don't wanna be here? Send us removal request.
@kkokkokye
jeongoh
21 days
RT @theori_io: 직장인 66%가 1년 내 퇴사하는 시대, 티오리에서는 어떻게 5년을 함께할 수 있었을까요? 티오리 구성원의 장기근속 비결을 확인해 보세요! 🔗 #티오리 #Theori #회사문화…
0
3
0
@kkokkokye
jeongoh
2 months
RT @__suto: Made a brief slide summarizing OTHERS ’ reports on V8 WebAssembly Engine. Hope you find it helpful!
0
32
0
@kkokkokye
jeongoh
2 months
RT @theori_io: 🎩 Theori at Black Hat Europe 2024 Our researchers @bbbig12 and Gwangun Jung will be presenting their VMware full chain expl…
0
4
0
@kkokkokye
jeongoh
2 months
RT @0xor0ne: Utilizing Cross-CPU Allocation to Exploit Preempt-Disabled Linux Kernel (Hexagon 2024 slides) Credit…
0
21
0
@kkokkokye
jeongoh
2 months
RT @0xor0ne: From null-byte cross-cache overflow to infinite arbitrary read & write (D^3CTF) Credits @arttnba3 #…
0
31
0
@kkokkokye
jeongoh
4 months
RT @0xor0ne: Exploiting a race condition in perf_events Linux kernel subsystem Credits @Binary_Gecko #infosec #L
0
46
0
@kkokkokye
jeongoh
4 months
RT @decoder_it: Administrator Protection, introduced in the latest Windows Insider Canary build, is a solid security enhancement... uhh.. r…
0
79
0
@kkokkokye
jeongoh
4 months
RT @thezdi: The kernel bug, CVE-2024-30088 was reported through the ZDI program. Our colleagues at @TrendMicroRSRCH have details on how APT…
0
6
0
@kkokkokye
jeongoh
4 months
RT @decoder_it: Following up on my earlier tweet ( regarding Kerberos relay with SMB server, I've uploaded my quick…
0
98
0
@kkokkokye
jeongoh
4 months
RT @hexacon_fr: Guest Revolution: Our Story of Compromising the Host Kernel from the VMware Guest by @bbbig12 & @pr0Ln #HEXACON2024 https…
0
1
0
@kkokkokye
jeongoh
5 months
RT @hackyboiz: [Research] Hyper-V 1-day Class: CVE-2024-38127 이번 연구글도 Hyper-V LPE 취약점 분석입니다. CVE-2024-38127의 patch diffing, poc에 대해 다루었습니다…
0
27
0
@kkokkokye
jeongoh
5 months
RT @gatariee: proxychains + impacket = profit
0
137
0
@kkokkokye
jeongoh
5 months
RT @tmr232: I always wanted to have IDA's graph-overview for source-code. So I created a small VS-Code extension to do that for me. https:/…
0
64
0
@kkokkokye
jeongoh
5 months
RT @hexacon_fr: "Guest Revolution: Our Story of Compromising the Host Kernel from the VMware Guest" 🏚️ by Junoh Lee & Gwangun Jung (@pr0l
0
4
0
@kkokkokye
jeongoh
5 months
RT @hexacon_fr: "Utilizing Cross-CPU Allocation to Exploit Preempt-Disabled Linux Kernel" 🎩 🐇 🎩 by Mingi Cho & Wongi Lee"
0
5
0
@kkokkokye
jeongoh
5 months
RT @thezdi: We've updated our blog on abusing file deletes to escalate privileges. We've also released PoC to demonstrate this. The exploit…
0
79
0
@kkokkokye
jeongoh
5 months
RT @Hadess_security: Java RCE Scenarios Common scenarios include deserialization of untrusted data, unsafe reflect…
0
25
0
@kkokkokye
jeongoh
5 months
RT @0xor0ne: Bypassing ARM Memory Tagging Extension (MTE) with speculative execution attacks #ARM #infosec https:…
0
54
0
@kkokkokye
jeongoh
5 months
RT @buptsb: Rushing to learn some x64 assembly for CVE-2024-7965🧐
Tweet media one
Tweet media two
0
1
0
@kkokkokye
jeongoh
5 months
RT @HunterMapping: 🤖🤖🤖New Research:Cryptojacking via CVE-2023-22527----Dissecting a Full-Scale Cryptomining Ecosystem 🧐A new technical anal…
0
25
0