Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

[@0xor0ne](/creator/twitter/0xor0ne)
"Technical analysis of APT28s Phantom Net Voxel operation by @sekoia_io #infosec"  
[X Link](https://x.com/0xor0ne/status/1976181021709115823) [@0xor0ne](/creator/x/0xor0ne) 2025-10-09T07:00Z 82.5K followers, 8959 engagements


"CVE-2021-27365: analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures #Linux #kernel #exploit #infosec #cybersecurity"  
[X Link](https://x.com/0xor0ne/status/1622569562561454080) [@0xor0ne](/creator/x/0xor0ne) 2023-02-06T12:15Z 82.5K followers, 31.8K engagements


"Analysis and exploitation of a remotely exploitable heap overflow in the SSL VPN component of FortiGate and FortiProxy appliances (CVE-2022-42475) Credits @bishopfox #fortinet #exploit"  
[X Link](https://x.com/0xor0ne/status/1678313219868311553) [@0xor0ne](/creator/x/0xor0ne) 2023-07-10T08:00Z 82.5K followers, 22.1K engagements


"Writeup on Fortinet SSLVPN exploitation (CVE-202242475) #fortinet #infosec"  
[X Link](https://x.com/0xor0ne/status/1693707051195609539) [@0xor0ne](/creator/x/0xor0ne) 2023-08-21T19:30Z 82.5K followers, 30.9K engagements


"Heap exploitation Credits: @Ch0pin #cybersecurity #heap"  
[X Link](https://x.com/0xor0ne/status/1811053045699985833) [@0xor0ne](/creator/x/0xor0ne) 2024-07-10T15:01Z 82.5K followers, 18.7K engagements


"x64 Linux Binary Exploitation series Basic: Return into lib: RoP Chains: Stack Canaries: ASLR: Credits @Ch0pin #exploit"  
[X Link](https://x.com/0xor0ne/status/1814193564458307994) [@0xor0ne](/creator/x/0xor0ne) 2024-07-19T07:00Z 82.4K followers, 21.7K engagements


"Reverse engineering and breaking bare metal firmware encryption in FortiGate firewalls. Credits Jon Williams (@bishopfox) #Fortinet #cybersecurity"  
[X Link](https://x.com/0xor0ne/status/1817462514004693501) [@0xor0ne](/creator/x/0xor0ne) 2024-07-28T07:30Z 82.5K followers, 34.9K engagements


"Reverse engineering of FortiGate bare metal firmware encryption Credits Jon Williams #infosec #Fortinet"  
[X Link](https://x.com/0xor0ne/status/1870748631147364527) [@0xor0ne](/creator/x/0xor0ne) 2024-12-22T08:30Z 82.5K followers, 22.6K engagements


"Security analysis of a Allen-Bradley (Rockwell Automation) PowerMonitor 1000 device Credits @Claroty #infosec"  
[X Link](https://x.com/0xor0ne/status/1946225112312644052) [@0xor0ne](/creator/x/0xor0ne) 2025-07-18T15:06Z 82.5K followers, 4001 engagements


"Example of buffer overflow in Linux kernel (6.2.0-rc1) with exploit PoC by Davide Ornaghi (CVE-2023-0179 affecting nftables) #Linux #kernel #infosec #cybersecurity #cve"  
[X Link](https://x.com/0xor0ne/status/1630259057213726720) [@0xor0ne](/creator/x/0xor0ne) 2023-02-27T17:30Z 82.5K followers, 31.8K engagements


"Analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures (CVE-2021-27365) #Linux #kernel #exploit #infosec #cybersecurity"  
[X Link](https://x.com/0xor0ne/status/1655112744574525440) [@0xor0ne](/creator/x/0xor0ne) 2023-05-07T07:30Z 82.5K followers, 22.6K engagements


"Payment card terminals analysis and reverse engineering (Worldline Yomani XR terminal) #embedded #reverseengineering"  
[X Link](https://x.com/0xor0ne/status/1968933197531447615) [@0xor0ne](/creator/x/0xor0ne) 2025-09-19T07:00Z 82.5K followers, 13.8K engagements


"Remote code execution exploit on the Synology TC500 smart camera by @infosectcbr #infosec #embedded"  
[X Link](https://x.com/0xor0ne/status/1973047889829015862) [@0xor0ne](/creator/x/0xor0ne) 2025-09-30T15:30Z 82.5K followers, 13.2K engagements


"Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001) Credits @cor_ctf #infosec #Linux"  
[X Link](https://x.com/0xor0ne/status/1977404109402562949) [@0xor0ne](/creator/x/0xor0ne) 2025-10-12T16:00Z 82.5K followers, 24.8K engagements


"Beginners introduction to Linux kernel rootkits #Linux #infosec"  
[X Link](https://x.com/0xor0ne/status/1978717672956133565) [@0xor0ne](/creator/x/0xor0ne) 2025-10-16T07:00Z 82.5K followers, 9385 engagements


"Series on Linux kernel exploitation by @ri5255 #infosec #Linux"  
[X Link](https://x.com/0xor0ne/status/1978838827490759051) [@0xor0ne](/creator/x/0xor0ne) 2025-10-16T15:01Z 82.5K followers, 5749 engagements


"Race Condition in Qualcomm KGSL Fault Mechanism leading to UaF Credits @streypaws #infosec"  
[X Link](https://x.com/0xor0ne/status/1979080219504820645) [@0xor0ne](/creator/x/0xor0ne) 2025-10-17T07:01Z 82.5K followers, 4253 engagements


"Valve Anti-Cheat (VAC) reverse engineering Credits @codeneverdies #cybersecurity"  
[X Link](https://x.com/0xor0ne/status/1979201429081321643) [@0xor0ne](/creator/x/0xor0ne) 2025-10-17T15:02Z 82.5K followers, 27.6K engagements


"Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras Credits @Watchful_IP #embedded #infosec"  
[X Link](https://x.com/0xor0ne/status/1979570801847234957) [@0xor0ne](/creator/x/0xor0ne) 2025-10-18T15:30Z 82.5K followers, 17.5K engagements


"Exploitation of CVE-20259961: authenticated remote code execution via the CWMP binary on TP-Link AX10 and AX1500 #infosec"  
[X Link](https://x.com/0xor0ne/status/1979940806866637070) [@0xor0ne](/creator/x/0xor0ne) 2025-10-19T16:00Z 82.5K followers, 21.8K engagements


"Breaking Server SGX via DRAM Bus Interposition #infosec"  
[X Link](https://x.com/0xor0ne/status/1980292155970048205) [@0xor0ne](/creator/x/0xor0ne) 2025-10-20T15:16Z 82.5K followers, 3773 engagements


"From Zero to QEMU: A journey into system emulation (slide deck by Antonio Nappa) #infosec #qemu"  
[X Link](https://x.com/0xor0ne/status/1980529711127081466) [@0xor0ne](/creator/x/0xor0ne) 2025-10-21T07:00Z 82.5K followers, 11.1K engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@0xor0ne "Technical analysis of APT28s Phantom Net Voxel operation by @sekoia_io #infosec"
X Link @0xor0ne 2025-10-09T07:00Z 82.5K followers, 8959 engagements

"CVE-2021-27365: analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures #Linux #kernel #exploit #infosec #cybersecurity"
X Link @0xor0ne 2023-02-06T12:15Z 82.5K followers, 31.8K engagements

"Analysis and exploitation of a remotely exploitable heap overflow in the SSL VPN component of FortiGate and FortiProxy appliances (CVE-2022-42475) Credits @bishopfox #fortinet #exploit"
X Link @0xor0ne 2023-07-10T08:00Z 82.5K followers, 22.1K engagements

"Writeup on Fortinet SSLVPN exploitation (CVE-202242475) #fortinet #infosec"
X Link @0xor0ne 2023-08-21T19:30Z 82.5K followers, 30.9K engagements

"Heap exploitation Credits: @Ch0pin #cybersecurity #heap"
X Link @0xor0ne 2024-07-10T15:01Z 82.5K followers, 18.7K engagements

"x64 Linux Binary Exploitation series Basic: Return into lib: RoP Chains: Stack Canaries: ASLR: Credits @Ch0pin #exploit"
X Link @0xor0ne 2024-07-19T07:00Z 82.4K followers, 21.7K engagements

"Reverse engineering and breaking bare metal firmware encryption in FortiGate firewalls. Credits Jon Williams (@bishopfox) #Fortinet #cybersecurity"
X Link @0xor0ne 2024-07-28T07:30Z 82.5K followers, 34.9K engagements

"Reverse engineering of FortiGate bare metal firmware encryption Credits Jon Williams #infosec #Fortinet"
X Link @0xor0ne 2024-12-22T08:30Z 82.5K followers, 22.6K engagements

"Security analysis of a Allen-Bradley (Rockwell Automation) PowerMonitor 1000 device Credits @Claroty #infosec"
X Link @0xor0ne 2025-07-18T15:06Z 82.5K followers, 4001 engagements

"Example of buffer overflow in Linux kernel (6.2.0-rc1) with exploit PoC by Davide Ornaghi (CVE-2023-0179 affecting nftables) #Linux #kernel #infosec #cybersecurity #cve"
X Link @0xor0ne 2023-02-27T17:30Z 82.5K followers, 31.8K engagements

"Analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures (CVE-2021-27365) #Linux #kernel #exploit #infosec #cybersecurity"
X Link @0xor0ne 2023-05-07T07:30Z 82.5K followers, 22.6K engagements

"Payment card terminals analysis and reverse engineering (Worldline Yomani XR terminal) #embedded #reverseengineering"
X Link @0xor0ne 2025-09-19T07:00Z 82.5K followers, 13.8K engagements

"Remote code execution exploit on the Synology TC500 smart camera by @infosectcbr #infosec #embedded"
X Link @0xor0ne 2025-09-30T15:30Z 82.5K followers, 13.2K engagements

"Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001) Credits @cor_ctf #infosec #Linux"
X Link @0xor0ne 2025-10-12T16:00Z 82.5K followers, 24.8K engagements

"Beginners introduction to Linux kernel rootkits #Linux #infosec"
X Link @0xor0ne 2025-10-16T07:00Z 82.5K followers, 9385 engagements

"Series on Linux kernel exploitation by @ri5255 #infosec #Linux"
X Link @0xor0ne 2025-10-16T15:01Z 82.5K followers, 5749 engagements

"Race Condition in Qualcomm KGSL Fault Mechanism leading to UaF Credits @streypaws #infosec"
X Link @0xor0ne 2025-10-17T07:01Z 82.5K followers, 4253 engagements

"Valve Anti-Cheat (VAC) reverse engineering Credits @codeneverdies #cybersecurity"
X Link @0xor0ne 2025-10-17T15:02Z 82.5K followers, 27.6K engagements

"Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras Credits @Watchful_IP #embedded #infosec"
X Link @0xor0ne 2025-10-18T15:30Z 82.5K followers, 17.5K engagements

"Exploitation of CVE-20259961: authenticated remote code execution via the CWMP binary on TP-Link AX10 and AX1500 #infosec"
X Link @0xor0ne 2025-10-19T16:00Z 82.5K followers, 21.8K engagements

"Breaking Server SGX via DRAM Bus Interposition #infosec"
X Link @0xor0ne 2025-10-20T15:16Z 82.5K followers, 3773 engagements

"From Zero to QEMU: A journey into system emulation (slide deck by Antonio Nappa) #infosec #qemu"
X Link @0xor0ne 2025-10-21T07:00Z 82.5K followers, 11.1K engagements

creator/twitter::1293289704843075586/posts
/creator/twitter::1293289704843075586/posts