[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] [@0xor0ne](/creator/twitter/0xor0ne) "Technical analysis of APT28s Phantom Net Voxel operation by @sekoia_io #infosec" [X Link](https://x.com/0xor0ne/status/1976181021709115823) [@0xor0ne](/creator/x/0xor0ne) 2025-10-09T07:00Z 82.5K followers, 8959 engagements "CVE-2021-27365: analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures #Linux #kernel #exploit #infosec #cybersecurity" [X Link](https://x.com/0xor0ne/status/1622569562561454080) [@0xor0ne](/creator/x/0xor0ne) 2023-02-06T12:15Z 82.5K followers, 31.8K engagements "Analysis and exploitation of a remotely exploitable heap overflow in the SSL VPN component of FortiGate and FortiProxy appliances (CVE-2022-42475) Credits @bishopfox #fortinet #exploit" [X Link](https://x.com/0xor0ne/status/1678313219868311553) [@0xor0ne](/creator/x/0xor0ne) 2023-07-10T08:00Z 82.5K followers, 22.1K engagements "Writeup on Fortinet SSLVPN exploitation (CVE-202242475) #fortinet #infosec" [X Link](https://x.com/0xor0ne/status/1693707051195609539) [@0xor0ne](/creator/x/0xor0ne) 2023-08-21T19:30Z 82.5K followers, 30.9K engagements "Heap exploitation Credits: @Ch0pin #cybersecurity #heap" [X Link](https://x.com/0xor0ne/status/1811053045699985833) [@0xor0ne](/creator/x/0xor0ne) 2024-07-10T15:01Z 82.5K followers, 18.7K engagements "x64 Linux Binary Exploitation series Basic: Return into lib: RoP Chains: Stack Canaries: ASLR: Credits @Ch0pin #exploit" [X Link](https://x.com/0xor0ne/status/1814193564458307994) [@0xor0ne](/creator/x/0xor0ne) 2024-07-19T07:00Z 82.4K followers, 21.7K engagements "Reverse engineering and breaking bare metal firmware encryption in FortiGate firewalls. Credits Jon Williams (@bishopfox) #Fortinet #cybersecurity" [X Link](https://x.com/0xor0ne/status/1817462514004693501) [@0xor0ne](/creator/x/0xor0ne) 2024-07-28T07:30Z 82.5K followers, 34.9K engagements "Reverse engineering of FortiGate bare metal firmware encryption Credits Jon Williams #infosec #Fortinet" [X Link](https://x.com/0xor0ne/status/1870748631147364527) [@0xor0ne](/creator/x/0xor0ne) 2024-12-22T08:30Z 82.5K followers, 22.6K engagements "Security analysis of a Allen-Bradley (Rockwell Automation) PowerMonitor 1000 device Credits @Claroty #infosec" [X Link](https://x.com/0xor0ne/status/1946225112312644052) [@0xor0ne](/creator/x/0xor0ne) 2025-07-18T15:06Z 82.5K followers, 4001 engagements "Example of buffer overflow in Linux kernel (6.2.0-rc1) with exploit PoC by Davide Ornaghi (CVE-2023-0179 affecting nftables) #Linux #kernel #infosec #cybersecurity #cve" [X Link](https://x.com/0xor0ne/status/1630259057213726720) [@0xor0ne](/creator/x/0xor0ne) 2023-02-27T17:30Z 82.5K followers, 31.8K engagements "Analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures (CVE-2021-27365) #Linux #kernel #exploit #infosec #cybersecurity" [X Link](https://x.com/0xor0ne/status/1655112744574525440) [@0xor0ne](/creator/x/0xor0ne) 2023-05-07T07:30Z 82.5K followers, 22.6K engagements "Payment card terminals analysis and reverse engineering (Worldline Yomani XR terminal) #embedded #reverseengineering" [X Link](https://x.com/0xor0ne/status/1968933197531447615) [@0xor0ne](/creator/x/0xor0ne) 2025-09-19T07:00Z 82.5K followers, 13.8K engagements "Remote code execution exploit on the Synology TC500 smart camera by @infosectcbr #infosec #embedded" [X Link](https://x.com/0xor0ne/status/1973047889829015862) [@0xor0ne](/creator/x/0xor0ne) 2025-09-30T15:30Z 82.5K followers, 13.2K engagements "Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001) Credits @cor_ctf #infosec #Linux" [X Link](https://x.com/0xor0ne/status/1977404109402562949) [@0xor0ne](/creator/x/0xor0ne) 2025-10-12T16:00Z 82.5K followers, 24.8K engagements "Beginners introduction to Linux kernel rootkits #Linux #infosec" [X Link](https://x.com/0xor0ne/status/1978717672956133565) [@0xor0ne](/creator/x/0xor0ne) 2025-10-16T07:00Z 82.5K followers, 9385 engagements "Series on Linux kernel exploitation by @ri5255 #infosec #Linux" [X Link](https://x.com/0xor0ne/status/1978838827490759051) [@0xor0ne](/creator/x/0xor0ne) 2025-10-16T15:01Z 82.5K followers, 5749 engagements "Race Condition in Qualcomm KGSL Fault Mechanism leading to UaF Credits @streypaws #infosec" [X Link](https://x.com/0xor0ne/status/1979080219504820645) [@0xor0ne](/creator/x/0xor0ne) 2025-10-17T07:01Z 82.5K followers, 4253 engagements "Valve Anti-Cheat (VAC) reverse engineering Credits @codeneverdies #cybersecurity" [X Link](https://x.com/0xor0ne/status/1979201429081321643) [@0xor0ne](/creator/x/0xor0ne) 2025-10-17T15:02Z 82.5K followers, 27.6K engagements "Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras Credits @Watchful_IP #embedded #infosec" [X Link](https://x.com/0xor0ne/status/1979570801847234957) [@0xor0ne](/creator/x/0xor0ne) 2025-10-18T15:30Z 82.5K followers, 17.5K engagements "Exploitation of CVE-20259961: authenticated remote code execution via the CWMP binary on TP-Link AX10 and AX1500 #infosec" [X Link](https://x.com/0xor0ne/status/1979940806866637070) [@0xor0ne](/creator/x/0xor0ne) 2025-10-19T16:00Z 82.5K followers, 21.8K engagements "Breaking Server SGX via DRAM Bus Interposition #infosec" [X Link](https://x.com/0xor0ne/status/1980292155970048205) [@0xor0ne](/creator/x/0xor0ne) 2025-10-20T15:16Z 82.5K followers, 3773 engagements "From Zero to QEMU: A journey into system emulation (slide deck by Antonio Nappa) #infosec #qemu" [X Link](https://x.com/0xor0ne/status/1980529711127081466) [@0xor0ne](/creator/x/0xor0ne) 2025-10-21T07:00Z 82.5K followers, 11.1K engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@0xor0ne
"Technical analysis of APT28s Phantom Net Voxel operation by @sekoia_io #infosec"
X Link @0xor0ne 2025-10-09T07:00Z 82.5K followers, 8959 engagements
"CVE-2021-27365: analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures #Linux #kernel #exploit #infosec #cybersecurity"
X Link @0xor0ne 2023-02-06T12:15Z 82.5K followers, 31.8K engagements
"Analysis and exploitation of a remotely exploitable heap overflow in the SSL VPN component of FortiGate and FortiProxy appliances (CVE-2022-42475) Credits @bishopfox #fortinet #exploit"
X Link @0xor0ne 2023-07-10T08:00Z 82.5K followers, 22.1K engagements
"Writeup on Fortinet SSLVPN exploitation (CVE-202242475) #fortinet #infosec"
X Link @0xor0ne 2023-08-21T19:30Z 82.5K followers, 30.9K engagements
"Heap exploitation Credits: @Ch0pin #cybersecurity #heap"
X Link @0xor0ne 2024-07-10T15:01Z 82.5K followers, 18.7K engagements
"x64 Linux Binary Exploitation series Basic: Return into lib: RoP Chains: Stack Canaries: ASLR: Credits @Ch0pin #exploit"
X Link @0xor0ne 2024-07-19T07:00Z 82.4K followers, 21.7K engagements
"Reverse engineering and breaking bare metal firmware encryption in FortiGate firewalls. Credits Jon Williams (@bishopfox) #Fortinet #cybersecurity"
X Link @0xor0ne 2024-07-28T07:30Z 82.5K followers, 34.9K engagements
"Reverse engineering of FortiGate bare metal firmware encryption Credits Jon Williams #infosec #Fortinet"
X Link @0xor0ne 2024-12-22T08:30Z 82.5K followers, 22.6K engagements
"Security analysis of a Allen-Bradley (Rockwell Automation) PowerMonitor 1000 device Credits @Claroty #infosec"
X Link @0xor0ne 2025-07-18T15:06Z 82.5K followers, 4001 engagements
"Example of buffer overflow in Linux kernel (6.2.0-rc1) with exploit PoC by Davide Ornaghi (CVE-2023-0179 affecting nftables) #Linux #kernel #infosec #cybersecurity #cve"
X Link @0xor0ne 2023-02-27T17:30Z 82.5K followers, 31.8K engagements
"Analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures (CVE-2021-27365) #Linux #kernel #exploit #infosec #cybersecurity"
X Link @0xor0ne 2023-05-07T07:30Z 82.5K followers, 22.6K engagements
"Payment card terminals analysis and reverse engineering (Worldline Yomani XR terminal) #embedded #reverseengineering"
X Link @0xor0ne 2025-09-19T07:00Z 82.5K followers, 13.8K engagements
"Remote code execution exploit on the Synology TC500 smart camera by @infosectcbr #infosec #embedded"
X Link @0xor0ne 2025-09-30T15:30Z 82.5K followers, 13.2K engagements
"Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001) Credits @cor_ctf #infosec #Linux"
X Link @0xor0ne 2025-10-12T16:00Z 82.5K followers, 24.8K engagements
"Beginners introduction to Linux kernel rootkits #Linux #infosec"
X Link @0xor0ne 2025-10-16T07:00Z 82.5K followers, 9385 engagements
"Series on Linux kernel exploitation by @ri5255 #infosec #Linux"
X Link @0xor0ne 2025-10-16T15:01Z 82.5K followers, 5749 engagements
"Race Condition in Qualcomm KGSL Fault Mechanism leading to UaF Credits @streypaws #infosec"
X Link @0xor0ne 2025-10-17T07:01Z 82.5K followers, 4253 engagements
"Valve Anti-Cheat (VAC) reverse engineering Credits @codeneverdies #cybersecurity"
X Link @0xor0ne 2025-10-17T15:02Z 82.5K followers, 27.6K engagements
"Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras Credits @Watchful_IP #embedded #infosec"
X Link @0xor0ne 2025-10-18T15:30Z 82.5K followers, 17.5K engagements
"Exploitation of CVE-20259961: authenticated remote code execution via the CWMP binary on TP-Link AX10 and AX1500 #infosec"
X Link @0xor0ne 2025-10-19T16:00Z 82.5K followers, 21.8K engagements
"Breaking Server SGX via DRAM Bus Interposition #infosec"
X Link @0xor0ne 2025-10-20T15:16Z 82.5K followers, 3773 engagements
"From Zero to QEMU: A journey into system emulation (slide deck by Antonio Nappa) #infosec #qemu"
X Link @0xor0ne 2025-10-21T07:00Z 82.5K followers, 11.1K engagements
/creator/twitter::1293289704843075586/posts