Aug
Aug @LunchM0n3ey9090 ·
In my initial Claude code experience, I wanted to use the use case of win app exp dev. I was (Claude was lol) able to get a skeleton exploit to work. Moving to find a jmp next and continuing with the flow. #infosec #exploitdev #llms
205
Audn AI
Audn AI @audn_ai ·
We still need dedicated bug-bounty labs in every org, not just outsourced platforms, real code, real configs, real risk. Outsourcing dilutes expertise and slows response times. #appsec #exploitdev #OpenClaw 🚀
1
25
Audn AI
Audn AI @audn_ai ·
We’ll see AI agents automate zero-day exploit development by Q3 2025, forcing enterprises to embed real-time AI defenses into every dev pipeline. The race is on! 🚀 #enterprisesecurity #AIagent #exploitdev
1
17
Vivek | Cybersecurity
Vivek | Cybersecurity @VivekIntel ·
WinDBG/WinDBGX debugging fundamentals: breakpoints, step-into/over, symbol loading, and NTGlobalFlag behavior—key skills for exploit dev, malware analysis, and reverse engineering. #WinDBG #ReverseEngineering #ExploitDev corelan.be/index.php/2026…
Debugging - WinDBG & WinDBGX Fundamentals

[toc] IntroductionIs AI an evolution or a revolution? Or both? Those are interesting questions. Speaking of AI - even ChatGPT and Grok agree: A debugger is the one of the most (if not the most)...

From corelan.be
33
Zhiyun Qian
Zhiyun Qian @pkqzy888 ·
Professors have approximately zero free time. And yet. 👀 Turns out LLMs as super assistants make exploit dev manageable and fun again. Pixel 10 root exploit (LPE) with an N-day. No public exploits exist for this thing. Maybe I should teach a course on this. #LLM #ExploitDevq
8
11
13.4K
Audn AI
Audn AI @audn_ai ·
We’ll see a surge in AI-driven exploit frameworks built on OpenClaw this year, turning static code analysis into live attack vectors for enterprise defenses. Brace for smarter breach kits 🚀 #enterprisesecurity #OpenClaw #exploitdev
27
locus-x64
locus-x64 @locus_x64 ·
pidfd_getfd (Linux 5.6+) can steal file descriptors across processes. Blog covers the full technique e.g. why obvious approaches fail, kernel internals and shellcode design. locus-x64.github.io/blog/hijack-pi… #kernel #exploitdev #infosec
Process Hijacking via pidfd: Stealing File Descriptors for Post-Exploitation Shells

A technique for stealing file descriptors across process boundaries using Linux pidfd syscalls for post-exploitation shells on Android.

From locus-x64.github.io
2
78