- Senior Software Developer & Researcher
- Projects I have participated in:
- DAS-Sandbox(Maleware Sandbox) - UNIX-like Malware Research, Network Simulation Engine
- DAS-AI(AI for Cybersecurity) - Code Execution Sandbox, LLM Gateway
- Hunter(DAST) - Network Asset Discovery, DAST, WebApp Fingerprinting
Open Source Projects
- Hyuga|A tool for monitoring Out-of-Band (OOB) traffic, supporting DNS, HTTP, LDAP, RMI, and DNS-Rebinding.
- xssfinder|A tool for detecting DOM-Based XSS using taint analysis, based on Chrome Headless for dynamic semantic analysis of JavaScript.
- TrollAppDuplicator | iOS App duplicator for TrollStore
- go-embed-extractor|Extracting Go embeds
PR
- Tencent/AI-Infra-Guard
- Optimize the Fingerprint DSL parser (build AST and support short-circuit)
- Fix out-of-bounds panic when quoted string ends with a backslash
- Perf: reduce Docker image size
- moonD4rk/HackBrowserData
- Decrypt the browser master key on macOS via gcore(CVE-2025-24204)
- NSEcho/furlzz
- Add coverage guided with Stalker
- fix(init): use passed-in type when creating config
- Hemmelig.app
- Fix: Public secrets can be opened without a decryption key
- Fix: toggle Editor between read-only and editable
- saferwall/elf
- Fix parsing of ELF section header
- boy-hack/hack-requests
Vulnerability Research
| CVE-2025-1975 | Ollama |
DoS |
| CVE-2025-15453 | milvus |
REE, (By 0x1f and ac0d3r) |
| CVE-2025-14606 | Tiny RDM |
Insecure Deserialization, RCE |
| CVE-2025-5030 CVE-2025-5031 |
KillWxapkg |
Arbitrary File Write, RCE DoS |
| GHSA-6556-fwc2-fg2p GHSA-rrxm-2pvv-m66x |
picklescan |
Pickle deserialization detection bypass |
| CVE-2025-10975 | vlarl |
Insecure Deserialization, RCE |
| CVE-2025-8729 | LMeterX |
Path Traversal |
| CVE-2025-10974 | SewKinect |
Insecure Deserialization, RCE |
| CVE-2024-2007 | XAgent |
Container Escape |
| CVE-2023-34655 | ClashX | Unauthorized XPC Access Allows System Proxy Tampering |
| N/A/Oct 5, 2022 | Clash | In-the-wild 0-day 1click-RCE |
Toy program
- fbuzzer | A Frida-based toy in-process fuzzer 📣
- inx|Inject *.dylib into target process (like Frida) on macOS (arm64 and x86_64) 💉
- go-symbolic-execution | Go white-box symbolic execution demo 👨🏻💻
- TrollR2ool | iOS Runtime analysis tool 🧌
- gf.imipy.com - Today's meal picker 🥣
- pinger - Transfer custom messages via
ICMP. - v2hreo - V2ray macOS Menu Bar Application with
+ CGO.
- webportscan - Scan local service (TCP) ports over Web page.
- PiMonitor - Build a Controllable Web Video Monitor with
+
.
- Rua - Generate a
(rua.gif) from any avatar.
Others
- 微信公众号