SecurAddicted's profile picture. Builder & Breaker @MDSecLabs - Lifelong learner

Security Addicted

@SecurAddicted

Builder & Breaker @MDSecLabs - Lifelong learner

Security Addicted reposted

Vulnerability discovery in the Rust-based Windows Graphics Device Interface (GDI) kernel component research.checkpoint.com/2025/denial-of… Credits @CheckPointSW #infosec

0xor0ne's tweet image. Vulnerability discovery in the Rust-based Windows Graphics Device Interface (GDI) kernel component

research.checkpoint.com/2025/denial-of…

Credits @CheckPointSW

#infosec
0xor0ne's tweet image. Vulnerability discovery in the Rust-based Windows Graphics Device Interface (GDI) kernel component

research.checkpoint.com/2025/denial-of…

Credits @CheckPointSW

#infosec

Security Addicted reposted

Reversing Microsoft Defender's signatures for evasion. Deep dive into VDM guts - a gzip-compressed files with no encryption to evade entire signatures with just 1 byte change. A research by RETooling crew (@DrCh40s && @t0nvi). Nicely done, chaps! Post: retooling.io/blog/an-unexpe…

SEKTOR7net's tweet image. Reversing Microsoft Defender's signatures for evasion.

Deep dive into VDM guts - a gzip-compressed files with no encryption to evade entire signatures with just 1 byte change.

A research by RETooling crew (@DrCh40s && @t0nvi). Nicely done, chaps!

Post: retooling.io/blog/an-unexpe……
SEKTOR7net's tweet image. Reversing Microsoft Defender's signatures for evasion.

Deep dive into VDM guts - a gzip-compressed files with no encryption to evade entire signatures with just 1 byte change.

A research by RETooling crew (@DrCh40s && @t0nvi). Nicely done, chaps!

Post: retooling.io/blog/an-unexpe……

Security Addicted reposted

Devirtualizing VMProtect and Themida nac-l.github.io/2025/01/25/lif… #infosec

0xor0ne's tweet image. Devirtualizing VMProtect and Themida

nac-l.github.io/2025/01/25/lif…

#infosec

Security Addicted reposted

Blog post by @jmswrnr on reverse engineering and security analysis of an ESP32 based IoT device (2024) jmswrnr.com/blog/hacking-a… #esp32 #cybersecurity

0xor0ne's tweet image. Blog post by @jmswrnr on reverse engineering and security analysis of an ESP32 based IoT device (2024)

jmswrnr.com/blog/hacking-a…

#esp32 #cybersecurity
0xor0ne's tweet image. Blog post by @jmswrnr on reverse engineering and security analysis of an ESP32 based IoT device (2024)

jmswrnr.com/blog/hacking-a…

#esp32 #cybersecurity

Security Addicted reposted

Offensive Development - Implementing Shellcode Retrieval klezvirus.github.io/posts/OffDev-S…

5mukx's tweet image. Offensive Development - Implementing Shellcode Retrieval

klezvirus.github.io/posts/OffDev-S…

Security Addicted reposted

Exploiting NVIDIA's GPU Linux drivers blog.quarkslab.com/nvidia_gpu_ker… Excellent blog post by Robin Bastide (@quarkslab) #infosec

0xor0ne's tweet image. Exploiting NVIDIA's GPU Linux drivers

blog.quarkslab.com/nvidia_gpu_ker…

Excellent blog post by Robin Bastide (@quarkslab)

#infosec
0xor0ne's tweet image. Exploiting NVIDIA's GPU Linux drivers

blog.quarkslab.com/nvidia_gpu_ker…

Excellent blog post by Robin Bastide (@quarkslab)

#infosec

Security Addicted reposted

Introduction to windows shellcode development series Pt 1: securitycafe.ro/2015/10/30/int… Pt 2: securitycafe.ro/2015/12/14/int… Pt 3: securitycafe.ro/2016/02/15/int…

5mukx's tweet image. Introduction to windows shellcode development series

Pt 1: securitycafe.ro/2015/10/30/int… 
Pt 2: securitycafe.ro/2015/12/14/int…
Pt 3: securitycafe.ro/2016/02/15/int…
5mukx's tweet image. Introduction to windows shellcode development series

Pt 1: securitycafe.ro/2015/10/30/int… 
Pt 2: securitycafe.ro/2015/12/14/int…
Pt 3: securitycafe.ro/2016/02/15/int…

Security Addicted reposted

WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques cloud.google.com/blog/topics/th…

5mukx's tweet image. WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques

cloud.google.com/blog/topics/th…

Security Addicted reposted

📱 A Comprehensive Guide on Modern iOS Pentesting Guide: dvuln.com/blog/modern-io… Author: Noah Farmer (@d_vuln)

mqst_'s tweet image. 📱 A Comprehensive Guide on Modern iOS Pentesting

Guide: dvuln.com/blog/modern-io…

Author: Noah Farmer (@d_vuln)
mqst_'s tweet image. 📱 A Comprehensive Guide on Modern iOS Pentesting

Guide: dvuln.com/blog/modern-io…

Author: Noah Farmer (@d_vuln)

Security Addicted reposted

Rust for Malware Development Link: lnkd.in/dbZyTREX

hetmehtaa's tweet image. Rust for Malware Development

Link: lnkd.in/dbZyTREX

Security Addicted reposted

PAC, BTI, and relative vtables bypass by @bruce30262 (HITCON CTF 2025) bruce30262.github.io/hitcon-ctf-202… #infosec #ctf

0xor0ne's tweet image. PAC, BTI, and relative vtables bypass by @bruce30262 (HITCON CTF 2025)

bruce30262.github.io/hitcon-ctf-202…

#infosec #ctf

Security Addicted reposted

Guide to fuzzing the Binder kernel driver using the Linux Kernel Library (LKL) androidoffsec.withgoogle.com/posts/binder-f… Credits Eugene Rodionov, Gulshan Singh and Zi Fan Tan #infosec

0xor0ne's tweet image. Guide to fuzzing the Binder kernel driver using the Linux Kernel Library (LKL)

androidoffsec.withgoogle.com/posts/binder-f…

Credits Eugene Rodionov, Gulshan Singh and Zi Fan Tan

#infosec
0xor0ne's tweet image. Guide to fuzzing the Binder kernel driver using the Linux Kernel Library (LKL)

androidoffsec.withgoogle.com/posts/binder-f…

Credits Eugene Rodionov, Gulshan Singh and Zi Fan Tan

#infosec

Security Addicted reposted

Short introduction to Windows heap exploitation by @MrT4ntr4 mrt4ntr4.github.io/Windows-Heap-E… #infosec

0xor0ne's tweet image. Short introduction to Windows heap exploitation by @MrT4ntr4

mrt4ntr4.github.io/Windows-Heap-E…

#infosec
0xor0ne's tweet image. Short introduction to Windows heap exploitation by @MrT4ntr4

mrt4ntr4.github.io/Windows-Heap-E…

#infosec

Security Addicted reposted

Fault injection for secure boot bypass and secret extraction targeting RP2350 usenix.org/system/files/w… #infosec

0xor0ne's tweet image. Fault injection for secure boot bypass and secret extraction targeting RP2350

usenix.org/system/files/w…

#infosec

Security Addicted reposted

Rowhammer Attacks on DDR5 with Self-Correcting Synchronization comsec-files.ethz.ch/papers/phoenix… #infosec

0xor0ne's tweet image. Rowhammer Attacks on DDR5 with Self-Correcting Synchronization

comsec-files.ethz.ch/papers/phoenix…

#infosec
0xor0ne's tweet image. Rowhammer Attacks on DDR5 with Self-Correcting Synchronization

comsec-files.ethz.ch/papers/phoenix…

#infosec

Security Addicted reposted

CodeQL series by Sylwia Budzynska (@BlazingWindSec) Static analysis fundamentals: github.blog/developer-skil… Getting started: github.blog/developer-skil… Security research: github.blog/security/vulne… Gradio framework case study: github.blog/security/vulne… Debugging queries:…

0xor0ne's tweet image. CodeQL series by Sylwia Budzynska (@BlazingWindSec)

Static analysis fundamentals: github.blog/developer-skil…
Getting started: github.blog/developer-skil…
Security research: github.blog/security/vulne…
Gradio framework case study: github.blog/security/vulne…
Debugging queries:…
0xor0ne's tweet image. CodeQL series by Sylwia Budzynska (@BlazingWindSec)

Static analysis fundamentals: github.blog/developer-skil…
Getting started: github.blog/developer-skil…
Security research: github.blog/security/vulne…
Gradio framework case study: github.blog/security/vulne…
Debugging queries:…

Security Addicted reposted

3-parts series on vulnerability research and exploitation of the SMB3 Linux Kernel Server (ksmbd) by @Doyensec Part 1: blog.doyensec.com/2025/01/07/ksm… Part 2: blog.doyensec.com/2025/09/02/ksm… Part 3: blog.doyensec.com/2025/10/08/ksm… #infosec

0xor0ne's tweet image. 3-parts series on vulnerability research and exploitation of the SMB3 Linux Kernel Server (ksmbd) by @Doyensec

Part 1: blog.doyensec.com/2025/01/07/ksm…
Part 2: blog.doyensec.com/2025/09/02/ksm…
Part 3: blog.doyensec.com/2025/10/08/ksm…

#infosec
0xor0ne's tweet image. 3-parts series on vulnerability research and exploitation of the SMB3 Linux Kernel Server (ksmbd) by @Doyensec

Part 1: blog.doyensec.com/2025/01/07/ksm…
Part 2: blog.doyensec.com/2025/09/02/ksm…
Part 3: blog.doyensec.com/2025/10/08/ksm…

#infosec

Security Addicted reposted

Insyde H2O SecureBoot bypass. Three part series by @NikolajSchlej Part 1: coderush.me/hydroph0bia-pa… Part 2: coderush.me/hydroph0bia-pa… Part 3: #uefi #infosec

0xor0ne's tweet image. Insyde H2O SecureBoot bypass. Three part series by @NikolajSchlej

Part 1: coderush.me/hydroph0bia-pa…
Part 2: coderush.me/hydroph0bia-pa…
Part 3: 

#uefi #infosec

Security Addicted reposted

EDR Analysis: Leveraging Fake DLLs, Guard Pages, and VEH for Enhanced Detection redops.at/en/blog/edr-an…

5mukx's tweet image. EDR Analysis: Leveraging Fake DLLs, Guard Pages, and VEH for Enhanced Detection

redops.at/en/blog/edr-an…
5mukx's tweet image. EDR Analysis: Leveraging Fake DLLs, Guard Pages, and VEH for Enhanced Detection

redops.at/en/blog/edr-an…

Security Addicted reposted

Short blog post on reliable Linux system call interception blog.mggross.com/intercepting-s… #cybersecurity #Linux

0xor0ne's tweet image. Short blog post on reliable Linux system call interception

blog.mggross.com/intercepting-s…

#cybersecurity #Linux

Loading...

Something went wrong.


Something went wrong.