[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @0xor0ne 0xor0ne 0xor0ne posts on X about cybersecurity, tplink, vpn, stack the most. They currently have XXXXXX followers and 1035 posts still getting attention that total XXXXX engagements in the last XX hours. ### Engagements: XXXXX [#](/creator/twitter::1293289704843075586/interactions)  - X Week XXXXXX -XXXX% - X Month XXXXXXX +80% - X Months XXXXXXXXX -XX% - X Year XXXXXXXXX -XX% ### Mentions: XX [#](/creator/twitter::1293289704843075586/posts_active)  - X Week XX no change - X Month XX no change - X Months XXX +0.46% - X Year XXX -XXXX% ### Followers: XXXXXX [#](/creator/twitter::1293289704843075586/followers)  - X Week XXXXXX +0.25% - X Month XXXXXX +1.30% - X Months XXXXXX +9.20% - X Year XXXXXX +25% ### CreatorRank: XXXXXXX [#](/creator/twitter::1293289704843075586/influencer_rank)  ### Social Influence [#](/creator/twitter::1293289704843075586/influence) --- **Social category influence** [technology brands](/list/technology-brands) [stocks](/list/stocks) [currencies](/list/currencies) **Social topic influence** [cybersecurity](/topic/cybersecurity) #266, [tplink](/topic/tplink) #10, [vpn](/topic/vpn), [stack](/topic/stack), [automation](/topic/automation), [voxel](/topic/voxel), [dram](/topic/dram) ### Top Social Posts [#](/creator/twitter::1293289704843075586/posts) --- Top posts by engagements in the last XX hours "CVE-2021-27365: analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures #Linux #kernel #exploit #infosec #cybersecurity" [X Link](https://x.com/0xor0ne/status/1622569562561454080) [@0xor0ne](/creator/x/0xor0ne) 2023-02-06T12:15Z 82.5K followers, 31.8K engagements "Analysis and exploitation of a remotely exploitable heap overflow in the SSL VPN component of FortiGate and FortiProxy appliances (CVE-2022-42475) Credits @bishopfox #fortinet #exploit" [X Link](https://x.com/0xor0ne/status/1678313219868311553) [@0xor0ne](/creator/x/0xor0ne) 2023-07-10T08:00Z 82.5K followers, 22.1K engagements "Writeup on Fortinet SSLVPN exploitation (CVE-202242475) #fortinet #infosec" [X Link](https://x.com/0xor0ne/status/1693707051195609539) [@0xor0ne](/creator/x/0xor0ne) 2023-08-21T19:30Z 82.5K followers, 30.9K engagements "Heap exploitation Credits: @Ch0pin #cybersecurity #heap" [X Link](https://x.com/0xor0ne/status/1811053045699985833) [@0xor0ne](/creator/x/0xor0ne) 2024-07-10T15:01Z 82.5K followers, 18.7K engagements "x64 Linux Binary Exploitation series Basic: Return into lib: RoP Chains: Stack Canaries: ASLR: Credits @Ch0pin #exploit" [X Link](https://x.com/0xor0ne/status/1814193564458307994) [@0xor0ne](/creator/x/0xor0ne) 2024-07-19T07:00Z 82.4K followers, 21.7K engagements "Reverse engineering and breaking bare metal firmware encryption in FortiGate firewalls. Credits Jon Williams (@bishopfox) #Fortinet #cybersecurity" [X Link](https://x.com/0xor0ne/status/1817462514004693501) [@0xor0ne](/creator/x/0xor0ne) 2024-07-28T07:30Z 82.5K followers, 34.9K engagements "Reverse engineering of FortiGate bare metal firmware encryption Credits Jon Williams #infosec #Fortinet" [X Link](https://x.com/0xor0ne/status/1870748631147364527) [@0xor0ne](/creator/x/0xor0ne) 2024-12-22T08:30Z 82.5K followers, 22.6K engagements "Security analysis of a Allen-Bradley (Rockwell Automation) PowerMonitor 1000 device Credits @Claroty #infosec" [X Link](https://x.com/0xor0ne/status/1946225112312644052) [@0xor0ne](/creator/x/0xor0ne) 2025-07-18T15:06Z 82.5K followers, 4001 engagements "Example of buffer overflow in Linux kernel (6.2.0-rc1) with exploit PoC by Davide Ornaghi (CVE-2023-0179 affecting nftables) #Linux #kernel #infosec #cybersecurity #cve" [X Link](https://x.com/0xor0ne/status/1630259057213726720) [@0xor0ne](/creator/x/0xor0ne) 2023-02-27T17:30Z 82.5K followers, 31.8K engagements "Analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures (CVE-2021-27365) #Linux #kernel #exploit #infosec #cybersecurity" [X Link](https://x.com/0xor0ne/status/1655112744574525440) [@0xor0ne](/creator/x/0xor0ne) 2023-05-07T07:30Z 82.5K followers, 22.6K engagements "Payment card terminals analysis and reverse engineering (Worldline Yomani XR terminal) #embedded #reverseengineering" [X Link](https://x.com/0xor0ne/status/1968933197531447615) [@0xor0ne](/creator/x/0xor0ne) 2025-09-19T07:00Z 82.5K followers, 13.8K engagements "Remote code execution exploit on the Synology TC500 smart camera by @infosectcbr #infosec #embedded" [X Link](https://x.com/0xor0ne/status/1973047889829015862) [@0xor0ne](/creator/x/0xor0ne) 2025-09-30T15:30Z 82.5K followers, 13.2K engagements "Technical analysis of APT28s Phantom Net Voxel operation by @sekoia_io #infosec" [X Link](https://x.com/0xor0ne/status/1976181021709115823) [@0xor0ne](/creator/x/0xor0ne) 2025-10-09T07:00Z 82.5K followers, 8939 engagements "Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001) Credits @cor_ctf #infosec #Linux" [X Link](https://x.com/0xor0ne/status/1977404109402562949) [@0xor0ne](/creator/x/0xor0ne) 2025-10-12T16:00Z 82.5K followers, 24.8K engagements "Beginners introduction to Linux kernel rootkits #Linux #infosec" [X Link](https://x.com/0xor0ne/status/1978717672956133565) [@0xor0ne](/creator/x/0xor0ne) 2025-10-16T07:00Z 82.5K followers, 9355 engagements "Series on Linux kernel exploitation by @ri5255 #infosec #Linux" [X Link](https://x.com/0xor0ne/status/1978838827490759051) [@0xor0ne](/creator/x/0xor0ne) 2025-10-16T15:01Z 82.5K followers, 5734 engagements "Race Condition in Qualcomm KGSL Fault Mechanism leading to UaF Credits @streypaws #infosec" [X Link](https://x.com/0xor0ne/status/1979080219504820645) [@0xor0ne](/creator/x/0xor0ne) 2025-10-17T07:01Z 82.5K followers, 4237 engagements "Valve Anti-Cheat (VAC) reverse engineering Credits @codeneverdies #cybersecurity" [X Link](https://x.com/0xor0ne/status/1979201429081321643) [@0xor0ne](/creator/x/0xor0ne) 2025-10-17T15:02Z 82.5K followers, 27.6K engagements "Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras Credits @Watchful_IP #embedded #infosec" [X Link](https://x.com/0xor0ne/status/1979570801847234957) [@0xor0ne](/creator/x/0xor0ne) 2025-10-18T15:30Z 82.5K followers, 17.4K engagements "Exploitation of CVE-20259961: authenticated remote code execution via the CWMP binary on TP-Link AX10 and AX1500 #infosec" [X Link](https://x.com/0xor0ne/status/1979940806866637070) [@0xor0ne](/creator/x/0xor0ne) 2025-10-19T16:00Z 82.5K followers, 21.6K engagements "Breaking Server SGX via DRAM Bus Interposition #infosec" [X Link](https://x.com/0xor0ne/status/1980292155970048205) [@0xor0ne](/creator/x/0xor0ne) 2025-10-20T15:16Z 82.5K followers, 3699 engagements "From Zero to QEMU: A journey into system emulation (slide deck by Antonio Nappa) #infosec #qemu" [X Link](https://x.com/0xor0ne/status/1980529711127081466) [@0xor0ne](/creator/x/0xor0ne) 2025-10-21T07:00Z 82.5K followers, 10.5K engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
0xor0ne posts on X about cybersecurity, tplink, vpn, stack the most. They currently have XXXXXX followers and 1035 posts still getting attention that total XXXXX engagements in the last XX hours.
Social category influence technology brands stocks currencies
Social topic influence cybersecurity #266, tplink #10, vpn, stack, automation, voxel, dram
Top posts by engagements in the last XX hours
"CVE-2021-27365: analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures #Linux #kernel #exploit #infosec #cybersecurity"
X Link @0xor0ne 2023-02-06T12:15Z 82.5K followers, 31.8K engagements
"Analysis and exploitation of a remotely exploitable heap overflow in the SSL VPN component of FortiGate and FortiProxy appliances (CVE-2022-42475) Credits @bishopfox #fortinet #exploit"
X Link @0xor0ne 2023-07-10T08:00Z 82.5K followers, 22.1K engagements
"Writeup on Fortinet SSLVPN exploitation (CVE-202242475) #fortinet #infosec"
X Link @0xor0ne 2023-08-21T19:30Z 82.5K followers, 30.9K engagements
"Heap exploitation Credits: @Ch0pin #cybersecurity #heap"
X Link @0xor0ne 2024-07-10T15:01Z 82.5K followers, 18.7K engagements
"x64 Linux Binary Exploitation series Basic: Return into lib: RoP Chains: Stack Canaries: ASLR: Credits @Ch0pin #exploit"
X Link @0xor0ne 2024-07-19T07:00Z 82.4K followers, 21.7K engagements
"Reverse engineering and breaking bare metal firmware encryption in FortiGate firewalls. Credits Jon Williams (@bishopfox) #Fortinet #cybersecurity"
X Link @0xor0ne 2024-07-28T07:30Z 82.5K followers, 34.9K engagements
"Reverse engineering of FortiGate bare metal firmware encryption Credits Jon Williams #infosec #Fortinet"
X Link @0xor0ne 2024-12-22T08:30Z 82.5K followers, 22.6K engagements
"Security analysis of a Allen-Bradley (Rockwell Automation) PowerMonitor 1000 device Credits @Claroty #infosec"
X Link @0xor0ne 2025-07-18T15:06Z 82.5K followers, 4001 engagements
"Example of buffer overflow in Linux kernel (6.2.0-rc1) with exploit PoC by Davide Ornaghi (CVE-2023-0179 affecting nftables) #Linux #kernel #infosec #cybersecurity #cve"
X Link @0xor0ne 2023-02-27T17:30Z 82.5K followers, 31.8K engagements
"Analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures (CVE-2021-27365) #Linux #kernel #exploit #infosec #cybersecurity"
X Link @0xor0ne 2023-05-07T07:30Z 82.5K followers, 22.6K engagements
"Payment card terminals analysis and reverse engineering (Worldline Yomani XR terminal) #embedded #reverseengineering"
X Link @0xor0ne 2025-09-19T07:00Z 82.5K followers, 13.8K engagements
"Remote code execution exploit on the Synology TC500 smart camera by @infosectcbr #infosec #embedded"
X Link @0xor0ne 2025-09-30T15:30Z 82.5K followers, 13.2K engagements
"Technical analysis of APT28s Phantom Net Voxel operation by @sekoia_io #infosec"
X Link @0xor0ne 2025-10-09T07:00Z 82.5K followers, 8939 engagements
"Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001) Credits @cor_ctf #infosec #Linux"
X Link @0xor0ne 2025-10-12T16:00Z 82.5K followers, 24.8K engagements
"Beginners introduction to Linux kernel rootkits #Linux #infosec"
X Link @0xor0ne 2025-10-16T07:00Z 82.5K followers, 9355 engagements
"Series on Linux kernel exploitation by @ri5255 #infosec #Linux"
X Link @0xor0ne 2025-10-16T15:01Z 82.5K followers, 5734 engagements
"Race Condition in Qualcomm KGSL Fault Mechanism leading to UaF Credits @streypaws #infosec"
X Link @0xor0ne 2025-10-17T07:01Z 82.5K followers, 4237 engagements
"Valve Anti-Cheat (VAC) reverse engineering Credits @codeneverdies #cybersecurity"
X Link @0xor0ne 2025-10-17T15:02Z 82.5K followers, 27.6K engagements
"Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras Credits @Watchful_IP #embedded #infosec"
X Link @0xor0ne 2025-10-18T15:30Z 82.5K followers, 17.4K engagements
"Exploitation of CVE-20259961: authenticated remote code execution via the CWMP binary on TP-Link AX10 and AX1500 #infosec"
X Link @0xor0ne 2025-10-19T16:00Z 82.5K followers, 21.6K engagements
"Breaking Server SGX via DRAM Bus Interposition #infosec"
X Link @0xor0ne 2025-10-20T15:16Z 82.5K followers, 3699 engagements
"From Zero to QEMU: A journey into system emulation (slide deck by Antonio Nappa) #infosec #qemu"
X Link @0xor0ne 2025-10-21T07:00Z 82.5K followers, 10.5K engagements
/creator/twitter::0xor0ne