Vulnerability Researcher | Part-time Bug Bounty Hunter | @0Bugltd && @meghnacloud

Bangladesh
Joined March 2022
Sakib Sarkar🐞 retweeted
This is the most insane exploit I have seen in my life The exploiter has an IQ of 101 IQ
Sakib Sarkar🐞 retweeted
Sakib Sarkar🐞 retweeted
It’s purpose is suppression of the people
The Online Safety Act was never about protecting anyone.
Sakib Sarkar🐞 retweeted
Their only weakness...
2
53
4
320
Sakib Sarkar🐞 retweeted
I just found the coolest csp bypass ever! did you know that a valid pdf can ALSO be valid javascript? (details below)
Sakib Sarkar🐞 retweeted
BSides Pyongyang when??? @dprkcert
Sakib Sarkar🐞 retweeted
👀
3
1
33
Sakib Sarkar🐞 retweeted
Do you use a virtual machine to browse dangerous links safely? If you use the Chrome browser inside that virtual machine, is it secure enough? As you might have guessed, the answer is not so much. We chained six unique CVEs from 2023 listed below. • Chrome Renderer RCE : CVE-2023-3079 • Chrome Sandbox Escape : CVE-2023-21674 • LPE in guest OS : CVE-2023-29360 • VMware Info Leak : CVE-2023-34044 • VMware Escape : CVE-2023-20869 • LPE in host OS : CVE-2023-36802
Sakib Sarkar🐞 retweeted
Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application. ibm.com/think/x-force/operat…
Sakib Sarkar🐞 retweeted
Fuzzing Windows Defender in the Honggfuzz+IntelPT (hardware) mode scrapco.de/blog/fuzzing-wind… by @buherator
1
62
1
199
Sakib Sarkar🐞 retweeted
Thrilled to announce my new Project Zero blog post is LIVE! 🎉 I detail my knowledge-driven fuzzing process to find sandbox escape vulnerabilities in CoreAudio on MacOS. I'll talk about this and the exploitation process next week @offensive_con! googleprojectzero.blogspot.c…
Sakib Sarkar🐞 retweeted
[Research] Bypassing Windows Kernel Mitigations: Part0 - Deep Dive into KASLR Leaks Restriction hackyboiz.github.io/2025/04/… In this post, we’ll take a closer look at the new KASLR-related mitigation introduced in Windows 11 and Windows Server 24H2, and explore a novel method for bypassing it. #windows #24h2 #kernel #mitigation #kaslr #entrybleed #prefetch #sidechannel
3
86
326
Sakib Sarkar🐞 retweeted
Article: matheuzsecurity.github.io/ha… Github: github.com/MatheuZSecurity/E… ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code. #malware #gcc #ldpreload #linux
Sakib Sarkar🐞 retweeted
The BSides Canberra 2024 keynote is now available to watch! "The Exploit Development Life Cycle: From Concept to Compromise" – @chompie1337 breaks down the art of exploit dev, from that first spark to full pwnage. Missed it live? Watch it now: piped.video/ce0bXORSMX4
1
68
2
199
Sakib Sarkar🐞 retweeted
After many bypass attempts and creating several gadgets for RCE on @Apple, and after a looooooooong wait… we finally got it! @_l0gg #BugBounty
Sakib Sarkar🐞 retweeted
sipping coffee while autogdb.io overflows a binary
Sakib Sarkar🐞 retweeted
Another month, another writing RCE vulnerability inside Opera browser by using a stored self-XSS on MyFlow (this is different from the previous rce which I published back in 2021) medium.com/@renwa/stored-xss…
2
41
258