你可能會喜歡
Unveiling the details of Windows VTL2, despite its absence in the MSDN documentation. 🤔 #hyperv #windows #virtualization howknows.github.io/roooot.github.…
Just dropped a detailed blog post on our “BitUnlocker” research. If you’re into logical vulnerabilities and BitLocker bypasses, this one’s for you! techcommunity.microsoft.com/blog/microsoft…
One week ago, we came together at the MSRC Researcher Celebration during Black Hat to honor the incredible community that helps keep Microsoft secure. From meaningful conversations to Clippy through the decades on display, it was a night to connect and celebrate your…
Our slide is online: i.blackhat.com/BH-USA-25/Pres… Glad to share our pre-auth DoS & RCE bug hunting research at #BHUSA! Thanks @BlackHatEvents for the pre-recording, as we couldn’t attend in person this time for personal reasons. Questions? DM us @vv474172261 @XiaoWei___ @edwardzpeng
                                            Binarly is celebrating @phrack 40th anniversary! 61st floor energy. Legends only 🎉
                                            Booting into Breaches: Hunting Windows SecureBoot's Remote Attack Surfaces by @4zure9 i.blackhat.com/BH-USA-25/Pres…
                                            
                                            
                                            We’re proud to partner with Microsoft Most Valuable Researchers (MVRs) like Azure Yang (@4zure9) from Cyber Kunlun, whose collaboration has driven meaningful changes in Windows Secure boot. At Black Hat, Azure shared research exploring remote attack surfaces in the Windows boot…
                                            Happy to make list again! Thank you @msftsecresponse and congrats all!
The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s…
                                                                            Honored to hit #1 😁 Huge thx to @msftsecresponse for the support & to my friends for the lifts 🚀 Thanks to @guhe120 and @XiaoWei___ for their guidance and sharing🤗 Congrats to everyone on the board! 🎉
The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s…
                                                                            🎉 Honored to be #10 on the 2025 MSRC Most Valuable Researchers (MVR) Leaderboard! 🎉 Big thanks to the MSRC and bounty team for their quick response, and dedication to making security research impactful. Congrats to all fellow researchers on this year’s list.
The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s…
                                                                            🔓Join me at #BHUSA in Las Vegas (Aug 6) to dissect critical Secure Boot flaws! Until then: Try my OPEN-SOURCE scanner to: ✓ Check if YOUR system is vulnerable ✓ AUTO-GENERATE advisories ✓ Win/Linux support 🛠️Web tool:sbootbreaches.github.io 🐙Talk link:blackhat.com/us-25/briefing…
Experimenting with #BinExport builds for @HexRaysSA IDA Pro 9.1: github.com/cblichmann/bin… (macOS currently broken)
#BHUSA Briefings "Booting into Breaches: Hunting Windows SecureBoot's Remote Attack Surfaces" illustrate how attackers can pivot from firmware to OS-level control without physical access by chaining logical flaws in SecureBoot's trust model. Register here >>…
Excited to share that my talk "Booting into Breaches: Hunting Windows SecureBoot's Remote Attack Surfaces" has been accepted at @BlackHatEvents #BHUSA! 🎉 Looking forward to discussing SecureBoot research and the story behind these 31 CVEs in Las Vegas! See you there! 🔍💻
Excited to announce our talk has been accepted by @BlackHatEvents #BHUSA!🥳🥳🥳 In my part of presentation, I’ll cover logic-based pre-auth remote vulnerabilities uncovered via novel abuse of Windows native HTTP API. Can't wait to see y'all in Las Vegas! blackhat.com/us-25/briefing…
                                            I got this respond from MSRC. "Thank you for your feedback. Unless otherwise notified, our decision on this matter will stand."
New blog: Be careful of Your UDP Service: Preauth DoS on Windows Deployment Service (remote, 0-click) sites.google.com/site/zhiniangp…
amazing research
You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials. bughunters.google.com/blog/542484235…
Think you’ve got what it takes to pop shells and snag your ticket to... @REverseConf and @offbyoneconf ? 😏 github.com/star-sg/challe…
                                            United States 趨勢
- 1. Cowboys 64.5K posts
 - 2. Cardinals 28.5K posts
 - 3. #WWERaw 57.2K posts
 - 4. Jerry 43.5K posts
 - 5. Kyler 7,600 posts
 - 6. Logan Paul 9,335 posts
 - 7. Jacoby Brissett 4,743 posts
 - 8. Pickens 6,384 posts
 - 9. Koa Peat 5,838 posts
 - 10. Javonte 3,910 posts
 - 11. Cuomo 160K posts
 - 12. Bland 11.5K posts
 - 13. Dak Prescott 4,451 posts
 - 14. Walter Nolen 1,635 posts
 - 15. Keba Keita N/A
 - 16. Calais Campbell N/A
 - 17. Nick Smith 1,983 posts
 - 18. Jonathan Bailey 7,338 posts
 - 19. Pacers 11K posts
 - 20. #MondayNightFootball 1,304 posts
 
Something went wrong.
Something went wrong.