patch1t Profile Banner
Mickey Jin Profile
Mickey Jin

@patch1t

Followers
4K
Following
2K
Statuses
232

Exploring the world with my sword of debugger : )

Joined August 2013
Don't wanna be here? Send us removal request.
@patch1t
Mickey Jin
3 months
As promised, I just dropped a dozen new sandbox escape vulnerabilities at #POC2024 If you missed the talk, here is the blog post: Slides: Enjoy and find your own bugs 😎
@patch1t
Mickey Jin
5 months
Actually, 15+ new sandbox escape vulnerabilities discovered. All of them are simple logic issues. You may find your own sandbox 0-days by yourself after listening to this talk!🔥🔥🔥
10
136
445
@patch1t
Mickey Jin
1 day
RT @wh1te4ever: Safari 1day RCE exploit (1day practice)
0
67
0
@patch1t
Mickey Jin
3 days
RT @billmarczak: Update your iPhones.. again! iOS 18.3.1 out today with a fix for an ITW USB restricted mode bypass (via Accessibility) ht…
0
82
0
@patch1t
Mickey Jin
6 days
RT @patrickwardle: Looking for some weekend reading? I recently published a deep technical dive into *all* the new macOS malware of 2024 🍎…
0
58
0
@patch1t
Mickey Jin
10 days
@gergely_kalman Look forward to reading the blog 😊
0
0
5
@patch1t
Mickey Jin
10 days
RT @theevilbit: The bug @patch1t mentioned at the end of his blogpost (the one he couldn't share at OBTS) took Apple fixing 5 years!! Loo…
0
11
0
@patch1t
Mickey Jin
13 days
RT @0xjprx: CVE-2025-24118 is an absolutely crazy race condition I found in the macOS / XNU kernel. Safe memory reclamation, read-only obj…
0
78
0
@patch1t
Mickey Jin
14 days
New Blog Post: Tell you more about what I didn’t talk about at the #OBTS 7 @objective_see
3
35
114
@patch1t
Mickey Jin
1 month
@theevilbit Inject via dyld environment variable?🫣
1
0
8
@patch1t
Mickey Jin
1 month
New Blog Post in 2025: Tell you more about the AMFI👻
1
39
138
@patch1t
Mickey Jin
2 months
RT @karmaz95: Fresh article on how to build, #RE, #debug, and #recon #XPC services on #macOS with an #XCode #Programming walkthrough (#C an…
0
25
0
@patch1t
Mickey Jin
2 months
@theevilbit 🤣🤣🤣
0
0
5
@patch1t
Mickey Jin
2 months
@khronokernel @patrickwardle @andyrozen Really interesting talk, thank you 😊
0
0
4
@patch1t
Mickey Jin
2 months
My slides for the OBTS is here: Exploits: Blog will be posted after the fix of the variant issue.
6
40
162
@patch1t
Mickey Jin
2 months
0
0
1
@patch1t
Mickey Jin
3 months
RT @karmaz95: This article explains how #macOS handles #exceptions on #Apple Silicon (#arm64), transitions between #user - #kernel mode, di…
0
34
0
@patch1t
Mickey Jin
3 months
RT @ifsecure: The blog post (+tooling) on my Apple kernel extension fuzzing technique that I used to find several AppleAVD AV1 decoder bugs…
0
61
0
@patch1t
Mickey Jin
3 months
RT @jmpews: I did similar work , share some tricks. 1. append a new segment (used as static memory allocator). 2.hook 1st inst of every blo…
0
2
0
@patch1t
Mickey Jin
3 months
RT @R00tkitSMM: TL;DR I Implemented a super reliable macOS kernel binary rewriting to instrument any KEXT or XNU at…
0
196
0
@patch1t
Mickey Jin
3 months
RT @theevilbit: 🍎🐛🎙️Following my #poc2024 talk we are releasing a blogpost series @KandjiMDM detailing the vulnerabilities of diskarbitrati…
0
24
0
@patch1t
Mickey Jin
3 months
RT @POC_Crew: #POC2024 Meysam Firouzi(@R00tkitSMM) Pishi: Coverage-Guided Fuzzing of the XNU Kernel and Arbitrary KEXT 🚧
0
13
0