Twitter | Search | |
Matthias Kaiser
Vulnerability Researcher at . Tweets are my own.
2,612
Tweets
902
Following
4,303
Followers
Tweets
Matthias Kaiser retweeted
Captain Arrr!-E 3h
Guys I’m really excited to announce that Bryan and I are teaching courses open to the public! Tickets are live as I tweet. We’ll be adding more advanced Ghidra and classes in the near future. Find me at and chat me up!
Reply Retweet Like
Matthias Kaiser Jan 22
Replying to @niemand_sec @theflow0
Haha :-) I do renaming, assigning and figuring out which software engineering patterns were applied by the dev ;-)
Reply Retweet Like
Matthias Kaiser retweeted
Andy Nguyen Jan 20
Reverse engineering is mostly about naming stuff
Reply Retweet Like
Matthias Kaiser Jan 21
Replying to @hkashfi
Awesome! See you there :-)
Reply Retweet Like
Matthias Kaiser retweeted
Zero Day Initiative Jan 20
Setup is well underway for Miami. Can’t wait to get started. The drawing for order will be at 8:30 tomorrow morning.
Reply Retweet Like
Matthias Kaiser Jan 20
Replying to @PhilipTsukerman
"Essential COM" by Don Box
Reply Retweet Like
Matthias Kaiser retweeted
Code White GmbH Jan 17
Rumble in the pipe - a nice writeup about a vuln in by our teammate
Reply Retweet Like
Matthias Kaiser retweeted
pyn3rd Jan 16
-2020-2551 Weblogic RCE via iiop protocol, funny bug:D
Reply Retweet Like
Matthias Kaiser retweeted
Henry Chen Jan 16
CVE-2020-2551 WebLogic RCE via IIOP protocol.
Reply Retweet Like
Matthias Kaiser retweeted
Nico Waisman Jan 16
My favorite articles are the ones that walks you through the author methodology and strategy to find/exploit bugs. This is the case for last post on Chrome IPC vulnerabilities:
Reply Retweet Like
Matthias Kaiser retweeted
ϻг_ϻε Jan 14
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:
Reply Retweet Like
Matthias Kaiser Jan 14
Replying to @steventseeley
That's eclipse in dark mode :-( . Awesome work bro 😀👍
Reply Retweet Like
Matthias Kaiser retweeted
Alvaro Muñoz Jan 10
Thank you all for the best wishes. I will be joining a team of great security researchers at . Excited to start contributing to a better and more secure OSS!
Reply Retweet Like
Matthias Kaiser Jan 10
Replying to @pwntester
Wow. Congrats and all the best at ... :-)
Reply Retweet Like
Matthias Kaiser Jan 8
Replying to @dcuthbert
If you are talking about J2EE in particular IO operations such as file accesses and sockets should only be done from so called resource adapters (RA). For reasons see
Reply Retweet Like
Matthias Kaiser retweeted
Blue Frost Security Jan 7
Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher
Reply Retweet Like
Matthias Kaiser retweeted
ϻг_ϻε Jan 2
So many exciting things happening this year! First up? is releasing advisories for multiple auth bypass and over 💯 RCE vulnerabilities today in Data Center Network Manager. If permitted, a technical blog post will be released shortly after detailing how I did it :->
Reply Retweet Like
Matthias Kaiser Dec 24
Replying to @hkashfi @pyn3rd
Most of commercial software I have seen were using MQ because of reliability, etc. . SocketServer/Appender looks more like proof of concept code
Reply Retweet Like
Matthias Kaiser Dec 24
Replying to @hkashfi @pyn3rd
If you ever find one let me know. But I doubt this will ever happen.
Reply Retweet Like
Matthias Kaiser retweeted
Romain THOMAS Dec 22
's Android diff engine managed to detect changes in the recent security patch of Twitter! WARN: It still requires an in-depth analysis to check if this change fix a vulnerability but it can be a good starting point though.
Reply Retweet Like