Security Addicted
@SecurAddicted
Builder & Breaker @MDSecLabs - Lifelong learner
You might like
Vulnerability discovery in the Rust-based Windows Graphics Device Interface (GDI) kernel component research.checkpoint.com/2025/denial-of… Credits @CheckPointSW #infosec
Reversing Microsoft Defender's signatures for evasion. Deep dive into VDM guts - a gzip-compressed files with no encryption to evade entire signatures with just 1 byte change. A research by RETooling crew (@DrCh40s && @t0nvi). Nicely done, chaps! Post: retooling.io/blog/an-unexpe……
Devirtualizing VMProtect and Themida nac-l.github.io/2025/01/25/lif… #infosec
Blog post by @jmswrnr on reverse engineering and security analysis of an ESP32 based IoT device (2024) jmswrnr.com/blog/hacking-a… #esp32 #cybersecurity
Offensive Development - Implementing Shellcode Retrieval klezvirus.github.io/posts/OffDev-S…
Exploiting NVIDIA's GPU Linux drivers blog.quarkslab.com/nvidia_gpu_ker… Excellent blog post by Robin Bastide (@quarkslab) #infosec
Introduction to windows shellcode development series Pt 1: securitycafe.ro/2015/10/30/int… Pt 2: securitycafe.ro/2015/12/14/int… Pt 3: securitycafe.ro/2016/02/15/int…
WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques cloud.google.com/blog/topics/th…
📱 A Comprehensive Guide on Modern iOS Pentesting Guide: dvuln.com/blog/modern-io… Author: Noah Farmer (@d_vuln)
PAC, BTI, and relative vtables bypass by @bruce30262 (HITCON CTF 2025) bruce30262.github.io/hitcon-ctf-202… #infosec #ctf
Guide to fuzzing the Binder kernel driver using the Linux Kernel Library (LKL) androidoffsec.withgoogle.com/posts/binder-f… Credits Eugene Rodionov, Gulshan Singh and Zi Fan Tan #infosec
Short introduction to Windows heap exploitation by @MrT4ntr4 mrt4ntr4.github.io/Windows-Heap-E… #infosec
Fault injection for secure boot bypass and secret extraction targeting RP2350 usenix.org/system/files/w… #infosec
Rowhammer Attacks on DDR5 with Self-Correcting Synchronization comsec-files.ethz.ch/papers/phoenix… #infosec
CodeQL series by Sylwia Budzynska (@BlazingWindSec) Static analysis fundamentals: github.blog/developer-skil… Getting started: github.blog/developer-skil… Security research: github.blog/security/vulne… Gradio framework case study: github.blog/security/vulne… Debugging queries:…
3-parts series on vulnerability research and exploitation of the SMB3 Linux Kernel Server (ksmbd) by @Doyensec Part 1: blog.doyensec.com/2025/01/07/ksm… Part 2: blog.doyensec.com/2025/09/02/ksm… Part 3: blog.doyensec.com/2025/10/08/ksm… #infosec
Insyde H2O SecureBoot bypass. Three part series by @NikolajSchlej Part 1: coderush.me/hydroph0bia-pa… Part 2: coderush.me/hydroph0bia-pa… Part 3: #uefi #infosec
EDR Analysis: Leveraging Fake DLLs, Guard Pages, and VEH for Enhanced Detection redops.at/en/blog/edr-an…
Short blog post on reliable Linux system call interception blog.mggross.com/intercepting-s… #cybersecurity #Linux
United States Trends
- 1. Wemby 36.9K posts
- 2. Steph 75.8K posts
- 3. Spurs 32.9K posts
- 4. Draymond 16.1K posts
- 5. Warriors 55.5K posts
- 6. Clemson 11.3K posts
- 7. Louisville 11K posts
- 8. Zack Ryder 16.5K posts
- 9. #DubNation 2,111 posts
- 10. #SmackDown 53.1K posts
- 11. #Truedtac5GXWilliamEst 76.6K posts
- 12. WILLIAMEST CALLME MELODY 77.6K posts
- 13. Aaron Fox 2,422 posts
- 14. Massie 57.6K posts
- 15. Harden 15.1K posts
- 16. Marjorie Taylor Greene 48.8K posts
- 17. Bill Clinton 192K posts
- 18. Brohm 1,706 posts
- 19. Bubba 58.5K posts
- 20. PERTHSANTA JOY KAMUTEA 357K posts
Something went wrong.
Something went wrong.