0xor0ne's Avatar

0xor0ne

@0xor0ne.bsky.social

| CyberSecurity | Reverse Engineering | C and Rust | Exploit | Linux kernel | PhD | Only My Opinions :) |

1,307 Followers  |  20 Following  |  476 Posts  |  Joined: 16.11.2023
Posts Following

Posts by 0xor0ne (@0xor0ne.bsky.social)

Preview
SCOMmand and Conquer - Attacking System Center Operations Manager (Part 1) - SpecterOps TL:DR; SCOM suffers from similar insecure default configurations as its SCCM counterpart, enabling attackers to escalate privileges, harvest credentials, and ultimately compromise the entire managemen...

Two part series on attacking System Center Operations Manager (SCOM): management group takeover via NTLM relay and RunAs credential recovery (2025)

Part 1: specterops.io/blog/2025/12...
Part 2: specterops.io/blog/2025/12...

Research by Matt Johnson and Garrett Foster

#infosec

28.02.2026 11:58 β€” πŸ‘ 11    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Preview
GitHub - emproof-com/workshop_firmware_reverse_engineering: Workshop on firmware reverse engineering Workshop on firmware reverse engineering. Contribute to emproof-com/workshop_firmware_reverse_engineering development by creating an account on GitHub.

Emproof's workshop material to get started with embedded firmware reverse engineering

github.com/emproof-com/...

#infosec #embedded

22.02.2026 12:27 β€” πŸ‘ 31    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
[CVE-2026-0714] TPM-sniffing LUKS Keys on an Embedded Device In October 2025, we performed a security assessment of the ARM-based Moxa UC-1222A Secure Edition industrial computer.

Recovering LUKS decryption key by passively monitoring the SPI bus between the SoC and the discrete TPM 2.0 device (Moxa UC-1222A)

www.cyloq.se/en/research/...

#infosec

21.02.2026 12:48 β€” πŸ‘ 8    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

Three-part series Binarly on Supermicro BMC firmware authentication bypasses

Part 1: www.binarly.io/blog/ghost-i...
Part 2: www.binarly.io/blog/broken-...
Part 3: www.binarly.io/blog/have-yo...

#infosec

15.02.2026 12:45 β€” πŸ‘ 14    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0
Preview
Binary Ninja - Defeating Anti-Reverse Engineering: A Deep Dive into the 'Trouble' Binary Binary Ninja is a modern reverse engineering platform with a scriptable and extensible decompiler.

Reverse engineering Linux anti-RE tricks (ELF headers, segment gaps, XOR layers, RC4 encryption)

binary.ninja/2026/01/23/r...

Credits: Xusheng Li

#infosec

27.01.2026 19:47 β€” πŸ‘ 50    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

Bruteforcing ECC and dumping firmware from a Potensic Atom 2 drone

neodyme.io/en/blog/dron...

#infosec

23.01.2026 23:03 β€” πŸ‘ 9    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

Great 3-parts series on 0-click exploit chain targeting Android Pixel 9

Part 1: projectzero.google/2026/01/pixe...
Part 2: projectzero.google/2026/01/pixe...
Part 3: projectzero.google/2026/01/pixe...

Research by Natalie Silvanovich and Seth Jenkins

#infosec

17.01.2026 11:47 β€” πŸ‘ 33    πŸ” 4    πŸ’¬ 1    πŸ“Œ 1
Preview
Not To Be Trusted - A Fiasco in Android TEEs Trusted Execution Environments (TEEs) based on ARM TrustZone form the backbone of modern Android devices' security architecture. The wor...

Escalate privileges from a rooted user space (N-EL0) to the highest privilege level in the Secure World (S-EL3) (Android Xiaomi Redmi 11s) (CCC 2025)

media.ccc.de/v/39c3-not-t...

#infosec

14.01.2026 20:11 β€” πŸ‘ 6    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Airoha Bluetooth RACE vulnerabilities (CVE-2025-20700/20701/20702)

Blog post: insinuator.net/2025/12/blue...

White paper: static.ernw.de/whitepaper/E...

Credits Dennis Heinze, Frieder Steinmetz

#infosec #bluetooth

11.01.2026 11:52 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Clang Hardening Cheat Sheet - Ten Years Later - Quarkslab's blog Ten years ago, we published a Clang Hardening Cheat Sheet. Since then, both the threat landscape and the Clang toolchain have evolved significantly. This blog post presents the new mitigations availab...

Clang Hardening Cheat Sheet (2026)

blog.quarkslab.com/clang-harden...

#infosec

10.01.2026 13:03 β€” πŸ‘ 11    πŸ” 4    πŸ’¬ 0    πŸ“Œ 1
Preview
GitHub - 0xor0ne/awesome-list: Cybersecurity oriented awesome list Cybersecurity oriented awesome list. Contribute to 0xor0ne/awesome-list development by creating an account on GitHub.

Curated list of cybersecurity research, RE material, exploitation write-ups, and tools.

github.com/0xor0ne/awes...

#infosec

30.12.2025 11:17 β€” πŸ‘ 68    πŸ” 12    πŸ’¬ 2    πŸ“Œ 1
Post image Post image

Bypassing secure boot on Raspberry RP2350 (paper)

www.usenix.org/system/files...

#infosec #embedded

30.12.2025 11:12 β€” πŸ‘ 10    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
Preview
Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer The Target: Brother MFC-J1010DW Affected Models: Brother Printer MFC-J1010DW Vulnerable Firmware: Version <= 1.18 TL;DR: The Vulnerability Chain We discovered three vulnerabilities that when chained...

Unauthenticated remote code execution on a Brother Printer MFC-J1010DW by chaining three vulnerabilities

starlabs.sg/blog/2025/11...

Credits NguyΓͺn Đăng NguyΓͺn, Manzel Seet and Amos Ng

#infosec #iot

26.12.2025 16:41 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

A look at an Android ITW DNG exploit.
Quram library exploit technical details (CVE-2025-21042)

googleprojectzero.blogspot.com/2025/12/a-lo...

#infosec

15.12.2025 12:20 β€” πŸ‘ 6    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Post image Post image Post image

Getting remote code execution on a Brother Printer (MFC-J1010DW) by chaining three vulnerabilities

starlabs.sg/blog/2025/11...

#infosec

08.12.2025 18:22 β€” πŸ‘ 93    πŸ” 14    πŸ’¬ 1    πŸ“Œ 1
Post image Post image

1-click exploit chain over Bluetooth stack used in automotive industry (PerfektBlue) (slides)

powerofcommunity.net/2025/slide/m...

Credits Mikhail Evdokimov

#infosec

30.11.2025 11:05 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

Synology Beestation Plus pre-auth exploitation and full system takeover

www.synacktiv.com/en/publicati...

Write up Arnaud Gatignol and ThΓ©o FauchΓ©

#infosec

28.11.2025 18:18 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

Abusing page table entries for exploiting Linux

ptr-yudai.hatenablog.com/entry/2025/0...

#Linux #infosec

17.11.2025 12:01 β€” πŸ‘ 79    πŸ” 12    πŸ’¬ 2    πŸ“Œ 0
Post image Post image

Interesting short blog post on how electronic passports cryptography works

blog.trailofbits.com/2025/10/31/t...

Credits Joop van de Pol

#infosec #embedded

09.11.2025 10:44 β€” πŸ‘ 46    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0
Post image

Analysis and exploitation of a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001)

syst3mfailure.io/rbtree-famil...

#infosec #Linux

08.11.2025 11:55 β€” πŸ‘ 39    πŸ” 8    πŸ’¬ 2    πŸ“Œ 1
Preview
Leveraging Generative AI to Reverse Engineer XLoader Check Point Research succeeded in understanding the infamous malware family, Xloader, by leveraging Generative AI

XLoader malware analysis with generative AI

research.checkpoint.com/2025/generat...

#infosec #malware

07.11.2025 11:05 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Valve Anti-Cheat (VAC) reverse engineering

codeneverdies.github.io/posts/gh-2/

#cybersecurity

06.11.2025 15:19 β€” πŸ‘ 59    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0
Preview
Offensive Security - Researcher - Jobs - Careers at Apple Apply for a Offensive Security - Researcher job at Apple. Read about the role and find out if it’s right for you.

Apple SEAR is hiring offensive security researchers!

We’re looking for talented researchers across multiple areas of security.

Check out the job description here:
jobs.apple.com/en-us/detail...

Feel free to reach out if you have any questions.

#infosec

24.10.2025 09:44 β€” πŸ‘ 6    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

Great deep-dive on AMD Zen microcode hacking and a signature-validation flaw

bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking

#infosec

20.10.2025 15:13 β€” πŸ‘ 15    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Preview
GitHub - 0xor0ne/awesome-list: Cybersecurity oriented awesome list Cybersecurity oriented awesome list. Contribute to 0xor0ne/awesome-list development by creating an account on GitHub.

Collection of blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation

github.com/0xor0ne/awes...

#cybersecurity #infosec

19.10.2025 11:36 β€” πŸ‘ 9    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

Presentations about getting started with Linux kernel exploitation

"Linux Kernel Exploitation for Beginners" by Kevin Massey:
rvasec.com/slides/2025/...

"Control Flow Hijacking in the Linux Kernel" by Valeriy Yashnikov
pt-phdays.storage.yandexcloud.net/Yashnikov_Va...

#Linux #infosec

19.10.2025 11:34 β€” πŸ‘ 23    πŸ” 4    πŸ’¬ 1    πŸ“Œ 0
Preview
Hacking the Nokia Beacon 1 Router: UART, Command Injection, and Password Generation with Qiling The Nokia Beacon 1 proved to be an interesting journey covering the full spectrum of techniques from hardware debug interfaces to firmware extraction and finally both static and dynamic analysis. I wa...

Teardown and exploitation of the Nokia Beacon 1 Router

spaceraccoon.dev/nokia-beacon...

#iot #infosec

18.10.2025 11:05 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Synology TC500 smart camera: Remote code execution (RCE) vulnerability

blog.infosectcbr.com.au/2025/08/01/e...

#infosec #embedded

17.10.2025 19:20 β€” πŸ‘ 11    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Excellent blog post on bypassing Ubuntu’s Unprivileged Namespace Restriction

u1f383.github.io/linux/2025/0...

#infosec

14.10.2025 17:55 β€” πŸ‘ 5    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
Windows Heap Exploitation - From Heap Overflow to Arbitrary R/W TLDR I was unable to find some good writeups/blogposts on Windows user mode heap exploitation which inspired me to write an introductory but practical post on Windows heap internals and exploitati

Short introduction to Windows heap exploitation

mrt4ntr4.github.io/Windows-Heap...

#infosec

13.10.2025 17:21 β€” πŸ‘ 12    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0