chompie

@chompie1337@haunted.computer
5.4K Followers
57 Following
126 Posts
pressing f8 over and over

CUDA de Grâce

Talk by @chompie1337 and Samuel Lovejoy about exploiting a race condition that leads to a double-free in the NVIDIA GPU driver to escape a container created with NVIDIA Container Toolkit.

Video: https://www.youtube.com/watch?v=Lvz2_ZHj3lo
Slides: https://docs.google.com/presentation/d/1FgfURpMyHhnflGWtxeq8ClPPaB5ZDCzT/edit?usp=sharing

HEXACON 2025 - CUDA de Grâce by Valentina Palmiotti & Samuel Lovejoy

YouTube
Hexacon - Conference – Speakers

Discover the accepted talks for this edition!

Hexacon
kernel hackers go serverless
ring0 → cloud 9 ☁️ ??
brb pwning yr gpu nodes ✨

Phrack turns 40.
The digital drop is live.
Download it. Archive it. Pass it on.
💾 https://www.phrack.org

#phrackat40 #phrack72

I've been asked countless times how to learn VR & xdev. The answer is always: "do something you think is cool". It's hard to figure out what to do. Try the PhrackCTF which I've now open-sourced. It's not a contrived CTF - modeled after real vulnerabilities

https://github.com/xforcered/PhrackCTF

GitHub - xforcered/PhrackCTF: Binary Exploitation Phrack CTF Challenge

Binary Exploitation Phrack CTF Challenge. Contribute to xforcered/PhrackCTF development by creating an account on GitHub.

GitHub
Tomorrow 7 PM PDT! Livestream w me and @malwaretech. We’ll look at this month’s Patch Tuesday, dissect a bindiff, and try to turn it into an exploit. I might also try to get him to solve the STILL UNSOLVED Windows Phrack CTF challenge 🤔
http://twitch.tv/malwaretechblog
MalwareTechBlog - Twitch

Cybersecurity, Tech, and General Discussions with Marcus Hutchins AKA MalwareTech. About Me: https://escapingtech.com/about/

Twitch

Are you going to @defcon ??

We'll have 9500 print copies of Phrack distributed around the con! Come to main stage Sunday @ noon to see phrack staffers @netspooky @richinseattle and @chompie1337 talk hacker history!

https://info.defcon.org/content/?id=60386

After 7 years of external circumstances getting in the way, I finally managed to sit down with @jackrhysider and record a Darknet Diaries episode. Check it out here! :D

https://darknetdiaries.com/episode/158/
MalwareTech – Darknet Diaries

MalwareTech was an anonymous security researcher, until he accidentally stopped WannaCry, one of the largest ransomware attacks in history. That single act of heroism shattered his anonymity and pulled him into a world he never expected.

Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application.

https://www.ibm.com/think/x-force/operationalizing-browser-exploits-to-bypass-wdac

Operationalizing browser exploits to bypass Windows Defender Application Control (WDAC)

Previously discovering a method for bypassing even the strictest WDAC policies by backdooring trusted Electron applications, the IBM X-Force Red team continued their research and can now bypass the restriction of executing JavaScript code only.

The Exploit Development Life Cycle: From Concept to Compromise /by @chompie1337

https://www.youtube.com/watch?v=ce0bXORSMX4
KEYNOTE: The Exploit Development Life Cycle: From Concept to Compromise, Valentina Palmiotti

YouTube