قد يعجبك
Unveiling the details of Windows VTL2, despite its absence in the MSDN documentation. 🤔 #hyperv #windows #virtualization howknows.github.io/roooot.github.…
Just dropped a detailed blog post on our “BitUnlocker” research. If you’re into logical vulnerabilities and BitLocker bypasses, this one’s for you! techcommunity.microsoft.com/blog/microsoft…
One week ago, we came together at the MSRC Researcher Celebration during Black Hat to honor the incredible community that helps keep Microsoft secure. From meaningful conversations to Clippy through the decades on display, it was a night to connect and celebrate your…
Our slide is online: i.blackhat.com/BH-USA-25/Pres… Glad to share our pre-auth DoS & RCE bug hunting research at #BHUSA! Thanks @BlackHatEvents for the pre-recording, as we couldn’t attend in person this time for personal reasons. Questions? DM us @vv474172261 @XiaoWei___ @edwardzpeng
Binarly is celebrating @phrack 40th anniversary! 61st floor energy. Legends only 🎉
Booting into Breaches: Hunting Windows SecureBoot's Remote Attack Surfaces by @4zure9 i.blackhat.com/BH-USA-25/Pres…
We’re proud to partner with Microsoft Most Valuable Researchers (MVRs) like Azure Yang (@4zure9) from Cyber Kunlun, whose collaboration has driven meaningful changes in Windows Secure boot. At Black Hat, Azure shared research exploring remote attack surfaces in the Windows boot…
Happy to make list again! Thank you @msftsecresponse and congrats all!
The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s…
Honored to hit #1 😁 Huge thx to @msftsecresponse for the support & to my friends for the lifts 🚀 Thanks to @guhe120 and @XiaoWei___ for their guidance and sharing🤗 Congrats to everyone on the board! 🎉
The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s…
🎉 Honored to be #10 on the 2025 MSRC Most Valuable Researchers (MVR) Leaderboard! 🎉 Big thanks to the MSRC and bounty team for their quick response, and dedication to making security research impactful. Congrats to all fellow researchers on this year’s list.
The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s…
🔓Join me at #BHUSA in Las Vegas (Aug 6) to dissect critical Secure Boot flaws! Until then: Try my OPEN-SOURCE scanner to: ✓ Check if YOUR system is vulnerable ✓ AUTO-GENERATE advisories ✓ Win/Linux support 🛠️Web tool:sbootbreaches.github.io 🐙Talk link:blackhat.com/us-25/briefing…
Experimenting with #BinExport builds for @HexRaysSA IDA Pro 9.1: github.com/cblichmann/bin… (macOS currently broken)
#BHUSA Briefings "Booting into Breaches: Hunting Windows SecureBoot's Remote Attack Surfaces" illustrate how attackers can pivot from firmware to OS-level control without physical access by chaining logical flaws in SecureBoot's trust model. Register here >>…
Excited to share that my talk "Booting into Breaches: Hunting Windows SecureBoot's Remote Attack Surfaces" has been accepted at @BlackHatEvents #BHUSA! 🎉 Looking forward to discussing SecureBoot research and the story behind these 31 CVEs in Las Vegas! See you there! 🔍💻
Excited to announce our talk has been accepted by @BlackHatEvents #BHUSA!🥳🥳🥳 In my part of presentation, I’ll cover logic-based pre-auth remote vulnerabilities uncovered via novel abuse of Windows native HTTP API. Can't wait to see y'all in Las Vegas! blackhat.com/us-25/briefing…
I got this respond from MSRC. "Thank you for your feedback. Unless otherwise notified, our decision on this matter will stand."
New blog: Be careful of Your UDP Service: Preauth DoS on Windows Deployment Service (remote, 0-click) sites.google.com/site/zhiniangp…
amazing research
You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials. bughunters.google.com/blog/542484235…
Think you’ve got what it takes to pop shells and snag your ticket to... @REverseConf and @offbyoneconf ? 😏 github.com/star-sg/challe…
United States الاتجاهات
- 1. Bengals 49.5K posts
- 2. Bengals 49.5K posts
- 3. Packers 53.7K posts
- 4. Panthers 43.9K posts
- 5. Colts 36.3K posts
- 6. Joe Flacco 5,103 posts
- 7. Steelers 53.4K posts
- 8. Lions 60.5K posts
- 9. Drake London 7,121 posts
- 10. #KeepPounding 6,107 posts
- 11. Falcons 28.8K posts
- 12. FanDuel 43.1K posts
- 13. Broncos 31.9K posts
- 14. Daniel Jones 8,510 posts
- 15. #Skol 4,531 posts
- 16. Vikings 37.8K posts
- 17. Caleb 35.5K posts
- 18. Zac Taylor 2,361 posts
- 19. Jordan Love 8,997 posts
- 20. LaFleur 6,688 posts
Something went wrong.
Something went wrong.