Skip to content
View impost0r's full-sized avatar
🎯
Focusing
🎯
Focusing

Highlights

  • Pro

Block or report impost0r

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
.github/profile/README.md

$whoami

I'm impost0r, a, vulnerabilitiy researcher, exploit engineer and reverse engineer that currently specializes in Unixes and Unix likes! What have I done? Good question.

🍎 Rotten Apples v1 - macOS Big Sur code signing translocation exploit (writeup here )

  • gzdoom stack-based buffer overflow - stack based buffer overflow in handling of WAD (Where's All the Data) files in gzDoom source port, leading to arbitrary register control/RCE via crafted WADfile
  • BFFx64 - CERT's "Basic File (format) Fuzzer", ported to 64 bit, allowing it to target more things.
  • onionslice - Tor deanonymization via Shodan and misconfigured .onion
  • Marathon and VTS Local Vulnerabilities -- responsible disclosure (ew) on VTube Studio local vulnerabilities and a patcher that fixes two of them.
  • And much more! Feel free to browse my repos! Some are simple tools, some are more complex tools to get the job done.

I also have a Twitch and YouTube where I ocassionally stream. Working on acquiring a capture card. Feel free to visit and say hi sometimes! You can find more about schedules and stuff on my Twitter (currently locked, just apply to follow!) here: Twitter

See ya around!

Pinned Loading

  1. Rotten-Apples Rotten-Apples Public

    macOS codesigning translocation vulnerability.

    42 8

  2. Marathon Marathon Public

    Patcher for local VTube Studio vulnerabilities.

    C# 1

  3. BFFx64 BFFx64 Public

    CERT's Basic Fuzzing Framework, but 64 bit.

    1

  4. ts3crash-analysis ts3crash-analysis Public

    analysis of the teamspeak 3.0.19 crash released by the developers @ r4p3.net

  5. Misc-Tools Misc-Tools Public

    Miscellaneous tools I've developed over the years for help in infosec.

    Go 4

  6. gzdoom-vuln-2018 gzdoom-vuln-2018 Public

    after a few days and many gummy bear vitamins i've decided to release my research. enjoy!

    Python 1