Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

# ![@0xor0ne Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::1293289704843075586.png) @0xor0ne 0xor0ne

0xor0ne posts on X about tplink, cybersecurity, dram, vpn the most. They currently have XXXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours.

### Engagements: XXXXX [#](/creator/twitter::1293289704843075586/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1293289704843075586/c:line/m:interactions.svg)

- X Week XXXXXX -XXXX%
- X Month XXXXXXX +80%
- X Months XXXXXXXXX -XX%
- X Year XXXXXXXXX -XX%

### Mentions: XX [#](/creator/twitter::1293289704843075586/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1293289704843075586/c:line/m:posts_active.svg)

- X Week XX no change
- X Month XX no change
- X Months XXX +0.46%
- X Year XXX -XXXX%

### Followers: XXXXXX [#](/creator/twitter::1293289704843075586/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1293289704843075586/c:line/m:followers.svg)

- X Week XXXXXX +0.25%
- X Month XXXXXX +1.30%
- X Months XXXXXX +9.20%
- X Year XXXXXX +25%

### CreatorRank: XXXXXXX [#](/creator/twitter::1293289704843075586/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1293289704843075586/c:line/m:influencer_rank.svg)

### Social Influence [#](/creator/twitter::1293289704843075586/influence)
---

**Social category influence**
[technology brands](/list/technology-brands)  XXXX% [stocks](/list/stocks)  XXXX% [currencies](/list/currencies)  XXX%

**Social topic influence**
[tplink](/topic/tplink) #9, [cybersecurity](/topic/cybersecurity) 5%, [dram](/topic/dram) 2.5%, [vpn](/topic/vpn) 2.5%, [stack](/topic/stack) 2.5%, [automation](/topic/automation) 2.5%, [voxel](/topic/voxel) XXX%

**Top accounts mentioned or mentioned by**
[@ch0pin](/creator/undefined) [@infosectcbr](/creator/undefined) [@pablomf6](/creator/undefined) [@bishopfox](/creator/undefined) [@claroty](/creator/undefined) [@codeneverdies](/creator/undefined) [@corctf](/creator/undefined) [@watchfulip](/creator/undefined) [@wrongbaud](/creator/undefined) [@intfinitysgfortinetseries3cve202242475sslvpnexploitstrategy2578597f892f](/creator/undefined) [@starlabssg](/creator/undefined) [@andreyknvl](/creator/undefined) [@slavamoskvin](/creator/undefined) [@a13xp0p0v](/creator/undefined) [@elmaios](/creator/undefined) [@bohops](/creator/undefined) [@sekoiaio](/creator/undefined) [@ri5255](/creator/undefined) [@streypaws](/creator/undefined) [@akhilsinghind](/creator/undefined)
### Top Social Posts [#](/creator/twitter::1293289704843075586/posts)
---
Top posts by engagements in the last XX hours

"Valve Anti-Cheat (VAC) reverse engineering Credits @codeneverdies #cybersecurity"  
[X Link](https://x.com/0xor0ne/status/1979201429081321643) [@0xor0ne](/creator/x/0xor0ne) 2025-10-17T15:02Z 82.5K followers, 27.6K engagements


"Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001) Credits @cor_ctf #infosec #Linux"  
[X Link](https://x.com/0xor0ne/status/1977404109402562949) [@0xor0ne](/creator/x/0xor0ne) 2025-10-12T16:00Z 82.5K followers, 24.8K engagements


"Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras Credits @Watchful_IP #embedded #infosec"  
[X Link](https://x.com/0xor0ne/status/1979570801847234957) [@0xor0ne](/creator/x/0xor0ne) 2025-10-18T15:30Z 82.5K followers, 17.4K engagements


"Remote code execution exploit on the Synology TC500 smart camera by @infosectcbr #infosec #embedded"  
[X Link](https://x.com/0xor0ne/status/1973047889829015862) [@0xor0ne](/creator/x/0xor0ne) 2025-09-30T15:30Z 82.5K followers, 13.2K engagements


"Breaking Server SGX via DRAM Bus Interposition #infosec"  
[X Link](https://x.com/0xor0ne/status/1980292155970048205) [@0xor0ne](/creator/x/0xor0ne) 2025-10-20T15:16Z 82.5K followers, 3729 engagements


"CVE-2021-27365: analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures #Linux #kernel #exploit #infosec #cybersecurity"  
[X Link](https://x.com/0xor0ne/status/1622569562561454080) [@0xor0ne](/creator/x/0xor0ne) 2023-02-06T12:15Z 82.5K followers, 31.8K engagements


"Analysis and exploitation of a remotely exploitable heap overflow in the SSL VPN component of FortiGate and FortiProxy appliances (CVE-2022-42475) Credits @bishopfox #fortinet #exploit"  
[X Link](https://x.com/0xor0ne/status/1678313219868311553) [@0xor0ne](/creator/x/0xor0ne) 2023-07-10T08:00Z 82.5K followers, 22.1K engagements


"Writeup on Fortinet SSLVPN exploitation (CVE-202242475) #fortinet #infosec"  
[X Link](https://x.com/0xor0ne/status/1693707051195609539) [@0xor0ne](/creator/x/0xor0ne) 2023-08-21T19:30Z 82.5K followers, 30.9K engagements


"Heap exploitation Credits: @Ch0pin #cybersecurity #heap"  
[X Link](https://x.com/0xor0ne/status/1811053045699985833) [@0xor0ne](/creator/x/0xor0ne) 2024-07-10T15:01Z 82.5K followers, 18.7K engagements


"x64 Linux Binary Exploitation series Basic: Return into lib: RoP Chains: Stack Canaries: ASLR: Credits @Ch0pin #exploit"  
[X Link](https://x.com/0xor0ne/status/1814193564458307994) [@0xor0ne](/creator/x/0xor0ne) 2024-07-19T07:00Z 82.4K followers, 21.7K engagements


"Reverse engineering and breaking bare metal firmware encryption in FortiGate firewalls. Credits Jon Williams (@bishopfox) #Fortinet #cybersecurity"  
[X Link](https://x.com/0xor0ne/status/1817462514004693501) [@0xor0ne](/creator/x/0xor0ne) 2024-07-28T07:30Z 82.5K followers, 34.9K engagements


"Reverse engineering of FortiGate bare metal firmware encryption Credits Jon Williams #infosec #Fortinet"  
[X Link](https://x.com/0xor0ne/status/1870748631147364527) [@0xor0ne](/creator/x/0xor0ne) 2024-12-22T08:30Z 82.5K followers, 22.6K engagements


"Security analysis of a Allen-Bradley (Rockwell Automation) PowerMonitor 1000 device Credits @Claroty #infosec"  
[X Link](https://x.com/0xor0ne/status/1946225112312644052) [@0xor0ne](/creator/x/0xor0ne) 2025-07-18T15:06Z 82.5K followers, 4001 engagements


"Example of buffer overflow in Linux kernel (6.2.0-rc1) with exploit PoC by Davide Ornaghi (CVE-2023-0179 affecting nftables) #Linux #kernel #infosec #cybersecurity #cve"  
[X Link](https://x.com/0xor0ne/status/1630259057213726720) [@0xor0ne](/creator/x/0xor0ne) 2023-02-27T17:30Z 82.5K followers, 31.8K engagements


"Technical analysis of APT28s Phantom Net Voxel operation by @sekoia_io #infosec"  
[X Link](https://x.com/0xor0ne/status/1976181021709115823) [@0xor0ne](/creator/x/0xor0ne) 2025-10-09T07:00Z 82.5K followers, 8939 engagements


"Payment card terminals analysis and reverse engineering (Worldline Yomani XR terminal) #embedded #reverseengineering"  
[X Link](https://x.com/0xor0ne/status/1968933197531447615) [@0xor0ne](/creator/x/0xor0ne) 2025-09-19T07:00Z 82.5K followers, 13.8K engagements


"Analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures (CVE-2021-27365) #Linux #kernel #exploit #infosec #cybersecurity"  
[X Link](https://x.com/0xor0ne/status/1655112744574525440) [@0xor0ne](/creator/x/0xor0ne) 2023-05-07T07:30Z 82.5K followers, 22.6K engagements


"Beginners introduction to Linux kernel rootkits #Linux #infosec"  
[X Link](https://x.com/0xor0ne/status/1978717672956133565) [@0xor0ne](/creator/x/0xor0ne) 2025-10-16T07:00Z 82.5K followers, 9358 engagements


"Series on Linux kernel exploitation by @ri5255 #infosec #Linux"  
[X Link](https://x.com/0xor0ne/status/1978838827490759051) [@0xor0ne](/creator/x/0xor0ne) 2025-10-16T15:01Z 82.5K followers, 5737 engagements


"Race Condition in Qualcomm KGSL Fault Mechanism leading to UaF Credits @streypaws #infosec"  
[X Link](https://x.com/0xor0ne/status/1979080219504820645) [@0xor0ne](/creator/x/0xor0ne) 2025-10-17T07:01Z 82.5K followers, 4242 engagements


"Exploitation of CVE-20259961: authenticated remote code execution via the CWMP binary on TP-Link AX10 and AX1500 #infosec"  
[X Link](https://x.com/0xor0ne/status/1979940806866637070) [@0xor0ne](/creator/x/0xor0ne) 2025-10-19T16:00Z 82.5K followers, 21.7K engagements


"From Zero to QEMU: A journey into system emulation (slide deck by Antonio Nappa) #infosec #qemu"  
[X Link](https://x.com/0xor0ne/status/1980529711127081466) [@0xor0ne](/creator/x/0xor0ne) 2025-10-21T07:00Z 82.5K followers, 10.6K engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@0xor0ne Avatar @0xor0ne 0xor0ne

0xor0ne posts on X about tplink, cybersecurity, dram, vpn the most. They currently have XXXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours.

Engagements: XXXXX #

Engagements Line Chart

  • X Week XXXXXX -XXXX%
  • X Month XXXXXXX +80%
  • X Months XXXXXXXXX -XX%
  • X Year XXXXXXXXX -XX%

Mentions: XX #

Mentions Line Chart

  • X Week XX no change
  • X Month XX no change
  • X Months XXX +0.46%
  • X Year XXX -XXXX%

Followers: XXXXXX #

Followers Line Chart

  • X Week XXXXXX +0.25%
  • X Month XXXXXX +1.30%
  • X Months XXXXXX +9.20%
  • X Year XXXXXX +25%

CreatorRank: XXXXXXX #

CreatorRank Line Chart

Social Influence #


Social category influence technology brands XXXX% stocks XXXX% currencies XXX%

Social topic influence tplink #9, cybersecurity 5%, dram 2.5%, vpn 2.5%, stack 2.5%, automation 2.5%, voxel XXX%

Top accounts mentioned or mentioned by @ch0pin @infosectcbr @pablomf6 @bishopfox @claroty @codeneverdies @corctf @watchfulip @wrongbaud @intfinitysgfortinetseries3cve202242475sslvpnexploitstrategy2578597f892f @starlabssg @andreyknvl @slavamoskvin @a13xp0p0v @elmaios @bohops @sekoiaio @ri5255 @streypaws @akhilsinghind

Top Social Posts #


Top posts by engagements in the last XX hours

"Valve Anti-Cheat (VAC) reverse engineering Credits @codeneverdies #cybersecurity"
X Link @0xor0ne 2025-10-17T15:02Z 82.5K followers, 27.6K engagements

"Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001) Credits @cor_ctf #infosec #Linux"
X Link @0xor0ne 2025-10-12T16:00Z 82.5K followers, 24.8K engagements

"Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras Credits @Watchful_IP #embedded #infosec"
X Link @0xor0ne 2025-10-18T15:30Z 82.5K followers, 17.4K engagements

"Remote code execution exploit on the Synology TC500 smart camera by @infosectcbr #infosec #embedded"
X Link @0xor0ne 2025-09-30T15:30Z 82.5K followers, 13.2K engagements

"Breaking Server SGX via DRAM Bus Interposition #infosec"
X Link @0xor0ne 2025-10-20T15:16Z 82.5K followers, 3729 engagements

"CVE-2021-27365: analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures #Linux #kernel #exploit #infosec #cybersecurity"
X Link @0xor0ne 2023-02-06T12:15Z 82.5K followers, 31.8K engagements

"Analysis and exploitation of a remotely exploitable heap overflow in the SSL VPN component of FortiGate and FortiProxy appliances (CVE-2022-42475) Credits @bishopfox #fortinet #exploit"
X Link @0xor0ne 2023-07-10T08:00Z 82.5K followers, 22.1K engagements

"Writeup on Fortinet SSLVPN exploitation (CVE-202242475) #fortinet #infosec"
X Link @0xor0ne 2023-08-21T19:30Z 82.5K followers, 30.9K engagements

"Heap exploitation Credits: @Ch0pin #cybersecurity #heap"
X Link @0xor0ne 2024-07-10T15:01Z 82.5K followers, 18.7K engagements

"x64 Linux Binary Exploitation series Basic: Return into lib: RoP Chains: Stack Canaries: ASLR: Credits @Ch0pin #exploit"
X Link @0xor0ne 2024-07-19T07:00Z 82.4K followers, 21.7K engagements

"Reverse engineering and breaking bare metal firmware encryption in FortiGate firewalls. Credits Jon Williams (@bishopfox) #Fortinet #cybersecurity"
X Link @0xor0ne 2024-07-28T07:30Z 82.5K followers, 34.9K engagements

"Reverse engineering of FortiGate bare metal firmware encryption Credits Jon Williams #infosec #Fortinet"
X Link @0xor0ne 2024-12-22T08:30Z 82.5K followers, 22.6K engagements

"Security analysis of a Allen-Bradley (Rockwell Automation) PowerMonitor 1000 device Credits @Claroty #infosec"
X Link @0xor0ne 2025-07-18T15:06Z 82.5K followers, 4001 engagements

"Example of buffer overflow in Linux kernel (6.2.0-rc1) with exploit PoC by Davide Ornaghi (CVE-2023-0179 affecting nftables) #Linux #kernel #infosec #cybersecurity #cve"
X Link @0xor0ne 2023-02-27T17:30Z 82.5K followers, 31.8K engagements

"Technical analysis of APT28s Phantom Net Voxel operation by @sekoia_io #infosec"
X Link @0xor0ne 2025-10-09T07:00Z 82.5K followers, 8939 engagements

"Payment card terminals analysis and reverse engineering (Worldline Yomani XR terminal) #embedded #reverseengineering"
X Link @0xor0ne 2025-09-19T07:00Z 82.5K followers, 13.8K engagements

"Analysis and exploitation of a Linux kernel heap buffer overflow in iSCSI data structures (CVE-2021-27365) #Linux #kernel #exploit #infosec #cybersecurity"
X Link @0xor0ne 2023-05-07T07:30Z 82.5K followers, 22.6K engagements

"Beginners introduction to Linux kernel rootkits #Linux #infosec"
X Link @0xor0ne 2025-10-16T07:00Z 82.5K followers, 9358 engagements

"Series on Linux kernel exploitation by @ri5255 #infosec #Linux"
X Link @0xor0ne 2025-10-16T15:01Z 82.5K followers, 5737 engagements

"Race Condition in Qualcomm KGSL Fault Mechanism leading to UaF Credits @streypaws #infosec"
X Link @0xor0ne 2025-10-17T07:01Z 82.5K followers, 4242 engagements

"Exploitation of CVE-20259961: authenticated remote code execution via the CWMP binary on TP-Link AX10 and AX1500 #infosec"
X Link @0xor0ne 2025-10-19T16:00Z 82.5K followers, 21.7K engagements

"From Zero to QEMU: A journey into system emulation (slide deck by Antonio Nappa) #infosec #qemu"
X Link @0xor0ne 2025-10-21T07:00Z 82.5K followers, 10.6K engagements

creator/x::0xor0ne
/creator/x::0xor0ne