![Mickey Jin Profile](https://pbs.twimg.com/profile_images/1275239278197436420/c8lRqAmp_x96.jpg)
Mickey Jin
@patch1t
Followers
4K
Following
2K
Statuses
232
Exploring the world with my sword of debugger : )
Joined August 2013
As promised, I just dropped a dozen new sandbox escape vulnerabilities at #POC2024 If you missed the talk, here is the blog post: Slides: Enjoy and find your own bugs 😎
Actually, 15+ new sandbox escape vulnerabilities discovered. All of them are simple logic issues. You may find your own sandbox 0-days by yourself after listening to this talk!🔥🔥🔥
10
136
445
RT @billmarczak: Update your iPhones.. again! iOS 18.3.1 out today with a fix for an ITW USB restricted mode bypass (via Accessibility) ht…
0
82
0
RT @patrickwardle: Looking for some weekend reading? I recently published a deep technical dive into *all* the new macOS malware of 2024 🍎…
0
58
0
RT @theevilbit: The bug @patch1t mentioned at the end of his blogpost (the one he couldn't share at OBTS) took Apple fixing 5 years!! Loo…
0
11
0
RT @R00tkitSMM: TL;DR I Implemented a super reliable macOS kernel binary rewriting to instrument any KEXT or XNU at…
0
196
0
RT @theevilbit: 🍎🐛🎙️Following my #poc2024 talk we are releasing a blogpost series @KandjiMDM detailing the vulnerabilities of diskarbitrati…
0
24
0
RT @POC_Crew: #POC2024 Meysam Firouzi(@R00tkitSMM) Pishi: Coverage-Guided Fuzzing of the XNU Kernel and Arbitrary KEXT 🚧
0
13
0