Tweets

You blocked @sleirsgoevy

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @sleirsgoevy

  1. Mar 19

    To clarify: I am NOT dead, I am NOT in Ukraine, and I have NOT been recruited into the army. Everyone telling the opposite is a detractor.

    Undo
  2. Feb 11

    Fixed "web lb" mode being broken on the Hamachi port. This fixes connection problems on some networks.

    Undo
  3. Feb 3

    Added a log dumping function to my Hamachi frontend. If you encounter mysterious errors, please attach the dumped logs to your bug report.

    Undo
  4. Feb 1
    Undo
  5. 26 Dec 2021
    Undo
  6. 21 Dec 2021
    Undo
  7. 18 Dec 2021

    So my 9.00 host is finally up: Use with caution. Web activator Soon™

    Undo
  8. 17 Dec 2021

    P.S. I mean the 9.00 webkit

    Show this thread
    Undo
  9. 17 Dec 2021

    Seems that I've finally caught the post-exploit instability issue some people discussed. Here it is: (You will also want to diff that to the original poc, there are some other changes)

    Show this thread
    Undo
  10. 14 Dec 2021

    You can also try using "DriveDroid" or "USB Mountr" apps, whatever one works for you.

    Show this thread
    Undo
  11. 14 Dec 2021

    If you have a rooted Android, you can try using [these scripts]( ) to emulate plugging/unplugging the drive. Tested on Samsung A6.

    Show this thread
    Undo
  12. 13 Dec 2021

    A crazy idea for "PS4 modchip" makers (that just bundle a wifi hotspot with preloaded hosts into an esp8266 chip): make your chips also emulate a usb connection and insert/remove the fake drive at the right time. This way your stuff will be finally of some use.

    Undo
  13. 20 Nov 2021

    Just got reminded that I forgot to upload fixed package installer binary. Here it is:

    Undo
  14. 27 Oct 2021

    P.S. No kernel exploit is out, DO NOT UPDATE

    Undo
  15. 27 Oct 2021

    Webkit PoC for 9.00, achieves arbitrary read/write and addrof/fakeobj

    Undo
  16. 24 Oct 2021

    BTW just finished another something-to-browser port. Remote package installation over NetCat! (Well, not actually...) Source code: Windows EXE: Linux users, build from source.

    Undo
  17. 24 Oct 2021

    Temporary host for the PoC:

    Undo
  18. 24 Oct 2021

    PoC for the FontFaceSet vulnerability, which was wrongly classified as a use-after-free. Works only on PC for now. Please check if this prints "failed to guess..." for you. Especially interested in reports from 9.00.

    Undo
  19. 5 Aug 2021

    Added Base64-encoded PSN ID to the web activator. Necessary for Chiaki activation.

    Undo
  20. 28 May 2021
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·