4zure9's profile picture. Retried CTF player, MSRC MVR 22/23/24/25

Azure

@4zure9

Retried CTF player, MSRC MVR 22/23/24/25

Azure أعاد

Unveiling the details of Windows VTL2, despite its absence in the MSDN documentation. 🤔 #hyperv #windows #virtualization howknows.github.io/roooot.github.…


Azure أعاد

Just dropped a detailed blog post on our “BitUnlocker” research. If you’re into logical vulnerabilities and BitLocker bypasses, this one’s for you! techcommunity.microsoft.com/blog/microsoft…


Azure أعاد

One week ago, we came together at the MSRC Researcher Celebration during Black Hat to honor the incredible community that helps keep Microsoft secure. From meaningful conversations to Clippy through the decades on display, it was a night to connect and celebrate your…


Azure أعاد

Our slide is online: i.blackhat.com/BH-USA-25/Pres… Glad to share our pre-auth DoS & RCE bug hunting research at #BHUSA! Thanks @BlackHatEvents for the pre-recording, as we couldn’t attend in person this time for personal reasons. Questions? DM us @vv474172261 @XiaoWei___ @edwardzpeng

KeyZ3r0's tweet image. Our slide is online: i.blackhat.com/BH-USA-25/Pres…

Glad to share our pre-auth DoS & RCE bug hunting research at #BHUSA! Thanks @BlackHatEvents for the pre-recording, as we couldn’t attend in person this time for personal reasons. Questions? DM us @vv474172261 @XiaoWei___ @edwardzpeng

Azure أعاد

Binarly is celebrating @phrack 40th anniversary! 61st floor energy. Legends only 🎉

binarly_io's tweet image. Binarly is celebrating @phrack 40th anniversary!

61st floor energy. Legends only 🎉

Azure أعاد

Booting into Breaches: Hunting Windows SecureBoot's Remote Attack Surfaces by @4zure9 i.blackhat.com/BH-USA-25/Pres…

alexjplaskett's tweet image. Booting into Breaches: Hunting Windows SecureBoot's Remote Attack Surfaces by @4zure9 

i.blackhat.com/BH-USA-25/Pres…
alexjplaskett's tweet image. Booting into Breaches: Hunting Windows SecureBoot's Remote Attack Surfaces by @4zure9 

i.blackhat.com/BH-USA-25/Pres…
alexjplaskett's tweet image. Booting into Breaches: Hunting Windows SecureBoot's Remote Attack Surfaces by @4zure9 

i.blackhat.com/BH-USA-25/Pres…

Azure أعاد

We’re proud to partner with Microsoft Most Valuable Researchers (MVRs) like Azure Yang (@4zure9) from Cyber Kunlun, whose collaboration has driven meaningful changes in Windows Secure boot. At Black Hat, Azure shared research exploring remote attack surfaces in the Windows boot…

msftsecresponse's tweet image. We’re proud to partner with Microsoft Most Valuable Researchers (MVRs) like Azure Yang (@4zure9) from Cyber Kunlun, whose collaboration has driven meaningful changes in Windows Secure boot. 

At Black Hat, Azure shared research exploring remote attack surfaces in the Windows boot…

Azure أعاد

Happy to make list again! Thank you @msftsecresponse and congrats all!

The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s…

msftsecresponse's tweet image. The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure.

Today, we are excited to recognize this year’s…


Azure أعاد

Honored to hit #1 😁 Huge thx to @msftsecresponse for the support & to my friends for the lifts 🚀 Thanks to @guhe120 and @XiaoWei___ for their guidance and sharing🤗 Congrats to everyone on the board! 🎉

The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s…

msftsecresponse's tweet image. The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure.

Today, we are excited to recognize this year’s…


🎉 Honored to be #10 on the 2025 MSRC Most Valuable Researchers (MVR) Leaderboard! 🎉 Big thanks to the MSRC and bounty team for their quick response, and dedication to making security research impactful. Congrats to all fellow researchers on this year’s list.

The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s…

msftsecresponse's tweet image. The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure.

Today, we are excited to recognize this year’s…


🔓Join me at #BHUSA in Las Vegas (Aug 6) to dissect critical Secure Boot flaws! Until then: Try my OPEN-SOURCE scanner to: ✓ Check if YOUR system is vulnerable ✓ AUTO-GENERATE advisories ✓ Win/Linux support 🛠️Web tool:sbootbreaches.github.io 🐙Talk link:blackhat.com/us-25/briefing…


Azure أعاد

#BHUSA Briefings "Booting into Breaches: Hunting Windows SecureBoot's Remote Attack Surfaces" illustrate how attackers can pivot from firmware to OS-level control without physical access by chaining logical flaws in SecureBoot's trust model. Register here >>…


Azure أعاد

v-v.space/2025/05/15/CVE… RDG RCE sharing


Excited to share that my talk "Booting into Breaches: Hunting Windows SecureBoot's Remote Attack Surfaces" has been accepted at @BlackHatEvents #BHUSA! 🎉 Looking forward to discussing SecureBoot research and the story behind these 31 CVEs in Las Vegas! See you there! 🔍💻


Azure أعاد

Excited to announce our talk has been accepted by @BlackHatEvents #BHUSA!🥳🥳🥳 In my part of presentation, I’ll cover logic-based pre-auth remote vulnerabilities uncovered via novel abuse of Windows native HTTP API. Can't wait to see y'all in Las Vegas! blackhat.com/us-25/briefing…

KeyZ3r0's tweet image. Excited to announce our talk has been accepted by
@BlackHatEvents #BHUSA!🥳🥳🥳
In my part of presentation, I’ll cover logic-based pre-auth remote vulnerabilities uncovered via novel abuse of Windows native HTTP API. 
Can't wait to see y'all in Las Vegas!
blackhat.com/us-25/briefing…

Azure أعاد

I got this respond from MSRC. "Thank you for your feedback. Unless otherwise notified, our decision on this matter will stand."


Azure أعاد

New blog: Be careful of Your UDP Service: Preauth DoS on Windows Deployment Service (remote, 0-click) sites.google.com/site/zhiniangp…


amazing research

You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials. bughunters.google.com/blog/542484235…



Azure أعاد

Think you’ve got what it takes to pop shells and snag your ticket to... @REverseConf and @offbyoneconf ? 😏 github.com/star-sg/challe…

starlabs_sg's tweet image. Think you’ve got what it takes to pop shells and snag your ticket to... @REverseConf  and @offbyoneconf ? 😏
github.com/star-sg/challe…

Loading...

Something went wrong.


Something went wrong.