TREVEX: A Black-Box Detection Framework For Data-Flow Transient Execution Vulnerabilities (paper, '26)
d-we.me/papers/treve...
#infosec
Posts by 0xor0ne
Analysis of CVE-2025-4802: glibc 2.27-2.38 fails to sanitize LD_LIBRARY_PATH before dlopen() in statically linked SUID binaries, allowing arbitrary library loading and LPE.
allelesecurity.com/libc-vuln-an...
Infosec
Software-only timing side-channel leaking mm_struct without a memory-safety bug, pivoting via cross-cache reuse to msg_msg/pipe_buffer, effective even on MTE.
lukasmaar.github.io/posts/heap-k...
Credits: Lukas Maar
#infosec
Reverse engineer and get full root access on the TP-Link Tapo C200 (2025)
quentinkaiser.be/security/202...
#infosec
Collection of paper related to LLM for vulnerability research/detection
github.com/huhusmang/Aw...
#infosec
Collection of resources for getting started with IoT/embedded devices vulnerability research
github.com/IamAlch3mist...
#infosec
Exploiting a use-after-free vulnerability in the Linux kernel’s packet socket subsystem, caused by a race condition between packet_set_ring() and packet_notifier() (CVE-2025-38617)
blog.calif.io/p/a-race-wit...
#infosec
Bypassing Linux kernel CR Pinning to execute shellcode by placing a KProbe in the native_write_cr4 instruction gap.
blog.zolutal.io/two-shot-ker...
#infosec
Excellent blog post on reverse engineering and exploiting a Xiaomi C400 Smart Camera
labs.taszk.io/articles/pos...
Research by Botond Hartmann
#infosec
Exploiting CVE-2022-0995 (Linux kernel OOB write in watch_queue) using the PageJack technique to create a page level UAF and overwrite struct file to gain LPE.
blog.quarkslab.com/pagejack-in-...
Credits Jean Vincent
#infosec
Cybersecurity blog posts, writeups, papers, and tools
github.com/0xor0ne/awes...
#infosec
VulHunt: vulnerability detection framework
github.com/vulhunt-re/v...
Accompanying blog series:
www.binarly.io/blog/vulhunt...
www.binarly.io/blog/vulhunt...
www.binarly.io/blog/vulnera...
www.binarly.io/blog/vulhunt...
www.binarly.io/blog/agentic...
#infosec
Analysis and exploitation of CVE-2025-38617, a race condition based use-after-free vulnerability in the Linux kernel’s packet socket subsystem
blog.calif.io/p/a-race-wit...
#Linux #infosec
Two part series on attacking System Center Operations Manager (SCOM): management group takeover via NTLM relay and RunAs credential recovery (2025)
Part 1: specterops.io/blog/2025/12...
Part 2: specterops.io/blog/2025/12...
Research by Matt Johnson and Garrett Foster
#infosec
Emproof's workshop material to get started with embedded firmware reverse engineering
github.com/emproof-com/...
#infosec #embedded
Recovering LUKS decryption key by passively monitoring the SPI bus between the SoC and the discrete TPM 2.0 device (Moxa UC-1222A)
www.cyloq.se/en/research/...
#infosec
Three-part series Binarly on Supermicro BMC firmware authentication bypasses
Part 1: www.binarly.io/blog/ghost-i...
Part 2: www.binarly.io/blog/broken-...
Part 3: www.binarly.io/blog/have-yo...
#infosec
Reverse engineering Linux anti-RE tricks (ELF headers, segment gaps, XOR layers, RC4 encryption)
binary.ninja/2026/01/23/r...
Credits: Xusheng Li
#infosec
Bruteforcing ECC and dumping firmware from a Potensic Atom 2 drone
neodyme.io/en/blog/dron...
#infosec
Great 3-parts series on 0-click exploit chain targeting Android Pixel 9
Part 1: projectzero.google/2026/01/pixe...
Part 2: projectzero.google/2026/01/pixe...
Part 3: projectzero.google/2026/01/pixe...
Research by Natalie Silvanovich and Seth Jenkins
#infosec
Escalate privileges from a rooted user space (N-EL0) to the highest privilege level in the Secure World (S-EL3) (Android Xiaomi Redmi 11s) (CCC 2025)
media.ccc.de/v/39c3-not-t...
#infosec
Airoha Bluetooth RACE vulnerabilities (CVE-2025-20700/20701/20702)
Blog post: insinuator.net/2025/12/blue...
White paper: static.ernw.de/whitepaper/E...
Credits Dennis Heinze, Frieder Steinmetz
#infosec #bluetooth
Clang Hardening Cheat Sheet (2026)
blog.quarkslab.com/clang-harden...
#infosec
Curated list of cybersecurity research, RE material, exploitation write-ups, and tools.
github.com/0xor0ne/awes...
#infosec
Unauthenticated remote code execution on a Brother Printer MFC-J1010DW by chaining three vulnerabilities
starlabs.sg/blog/2025/11...
Credits Nguyên Đăng Nguyên, Manzel Seet and Amos Ng
#infosec #iot
A look at an Android ITW DNG exploit.
Quram library exploit technical details (CVE-2025-21042)
googleprojectzero.blogspot.com/2025/12/a-lo...
#infosec
Getting remote code execution on a Brother Printer (MFC-J1010DW) by chaining three vulnerabilities
starlabs.sg/blog/2025/11...
#infosec
1-click exploit chain over Bluetooth stack used in automotive industry (PerfektBlue) (slides)
powerofcommunity.net/2025/slide/m...
Credits Mikhail Evdokimov
#infosec