hacker, weird machine mechanic, X-Force Offensive Research (XOR)

Joined October 2019
Pinned Tweet
kernel hackers go serverless ring0 → cloud 9 ☁️ ?? brb pwning yr gpu nodes ✨
chompie retweeted
You can also use this same idea to defeat CONFIG_SLAB_VIRTUAL, even if a kernel PTE has been assigned; the memory still has another VMA from the fixed phys/virt relationship We did this in our exploit for CVE-2025-23282 (public soon🤞)
We really should be talking about this more....KASLR is just not working properly on Android right now, and it hasn't for a long time. googleprojectzero.blogspot.c…
2
9
come work with the best advsim team !! ⬇️
Any Canadian friends with strong red team backgrounds looking for an AdvSim spot? ibmglobal.avature.net/en_US/…
6
25
@__sethJenkins broke kASLR by doing … nothing 😩 googleprojectzero.blogspot.c…
1
27
2
102
Chatting about Ouija boards this Halloween and was reminded of the CSS animated ANSI art Ouija board I made for the last episode of @thugcrowd. The font I designed for this was reused for the original @tmpout logo too! I just expanded some glyphs to make them line up better.
2
5
1
28
The sandbox escape vulnerability described by Kaspersky here is quite interesting. Especially in that the technical root cause of the issue bit both Chromium and FireFox developers. Other Windows apps along with OS components might well have similar vulnerabilities.
The Hacking Team is back/Operation ForumTroll Phishing link → WebGPU decrypt → Shellcode injection → COM hijack for persistence. Deploys Dante spyware (successor to RCS(Hacking Team), now Memento Labs) + custom LeetAgent for keylogging, file theft. Exploits: Zero-days CVE-2025-2783 (Chrome sandbox escape) & Phishing link → WebGPU decrypt → Shellcode injection → COM hijack for persistence. securelist.com/forumtroll-ap…
4
41
2
195
chompie retweeted
art is hacking! 💕✨️
Pixel art feels like solving a puzzle especially on a tiny canvas. Every color has to click into just the right spot to get the shape you want ⊹ ₊ ݁.
2
19
42 days, 13 flights, 9 cities, 5 countries, 3 continents: 3 talks & 1 keynote (in 2 languages), a newspaper article, many inspiring convos. Not bad for a homebody with a fear of flying 😌. Shout out @SinSinology @SudoR00tMe for making me look cool. Now to catch up on sleep!!!
9
2
1
269
Ending an insane 6 weeks with a celebration. I’m deeply honored to receive the Trailblazer Award from the Society of Women Engineers. Thank you @SWEtalk! Grateful to my mgmt, team, husband, family, and friends. Their support has made every one of my accomplishments possible.
chompie retweeted
[POC2025] SPEAKER UPDATE 👤 Christine Fossaceca(@x71n3) - "(Sploit)Lights, Camera, Action! Exploiting Spotlight to Bypass TCC and Leak Data from Apple Intelligence" #POC2025
7
36
Día 1 de @ekoparty: el equipo de X-Force mostró dos zero-day del driver de Nvidia que usan todos los sistemas de IA 🤖 Además: @RogerDingledine abrió con su keynote sobre Tor 🧅 Reportaje, en mi perfil 🔗
15
1
112
"Rompiendo la Jaula: Compromiso de la nube IA bajo fuego de GPU NVIDIA" dictada por @_dinolover38 y @chompie1337 | Sala E - Main Track #EKO2025 🔥
5
13
0
chompie retweeted
from the bottom of our hearts (McCaulay and Myself) Thank you to the LEGENDS Ryan @the_emmons and @stephenfewer for helping us since our device hard drive got damaged and went into bootloop and to top it off, hard drives were sold out (the chances) ETERNAL RESPECT FROM US🏆❤️‍🔥
📢 Confirmed! @SinSinology and @_mccaulay of @SummoningTeam used a pair of bugs to exploit of the Synology ActiveProtect Appliance DP320. That rounds their day off with another $50,000 and 5 more Master of Pwn points. (And clean that screen!) #Pwn2Own
2
7
177
chompie retweeted
i look tense. fuck
Whew! He took nearly all 30 minutes to make it happen, but @SinSinology successfully exploited the Synology DS925+. He heads off to the disclosure room to explain what took so long. #Pwn2Own #P2OIreland
11
6
278
chompie retweeted
Ever been on an SCCM site server and *this* close to a DA pw that you couldn't decrypt for some reason? Check out my new blog looking at encryption in use within SCCM sites configured for High Availability and accompanying tooling to recover passwords: ibm.com/think/x-force/decryp…
3
59
1
140
chompie retweeted
[POC2025] SPEAKER UPDATE 👥 Xingyu Jin(@1ce0ear) & Martijn Bogaard - "Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers" #POC2025
10
84
pretty sure we got in trouble by the HOA for having it and it eventually led to us moving lmao
1
35
Reminds me of a bonding activity I had with my Dad growing up. We had a huge satellite dish in our yard and we’d do “spying” which was just looking for random satellite feeds. I liked when I’d find an on the scene reporter waiting to go live and catch them like picking their nose
Researchers pointed a satellite dish at the sky for 3 years and monitored what unencrypted data it picked up. The results were shocking: They obtained thousands of T-Mobile users' phone calls and texts, military and law enforcement secrets, much more: wired.com/story/satellites-a…🧵👇
6
15
2
267
bring your eol exploits to @districtcon junkyard! now’s the time to flex yr cute demo
1
19
1
103
they didn’t want kCTF players to bankrupt them
3
8
1
166