The Exploit Development Life Cycle: From Concept to Compromise
https://www.youtube.com/watch?v=ce0bXORSMX4
https://www.youtube.com/watch?v=ce0bXORSMX4
YouTube
KEYNOTE: The Exploit Development Life Cycle: From Concept to Compromise, Valentina Palmiotti
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
Hooking Context Swaps with ETW
https://archie-osu.github.io/etw/hooking/2025/04/09/hooking-context-swaps-with-etw.html
https://archie-osu.github.io/etw/hooking/2025/04/09/hooking-context-swaps-with-etw.html
Archie’s reversing diary
Hooking Context Swaps with ETW
Event Tracing for Windows (ETW) is a kernel mechanism designed to log certain activity happening in the system. Despite its seemingly innocuous description, ETW can be a valuable source of information and a very interesting hook point for both anti-cheats…
JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and DCI/EXDI
https://www.youtube.com/watch?v=YKFXWsVRL1w&list=PLcwesr-0gPLozUKhGOiiACc4LZ2rTLhBh&index=9
https://www.youtube.com/watch?v=YKFXWsVRL1w&list=PLcwesr-0gPLozUKhGOiiACc4LZ2rTLhBh&index=9
YouTube
Recon2024 - Alan Sguigna&Ivan Rouzanov - JTAGDebugOfWindowsHyper VSecureKernelWithWinDbgAndDCIEXDI
For the first time, JTAG debugging tools for x64 are available to the general public. Using EXDI to connect WinDbg with the SourcePoint debugger, and Intel Direct Connect Interface (DCI) on the AAEON UP Xtreme i11, Windows Hyper-V and Secure Kernel can be…
write-up for the challenge Sec Mem which is an AARCH64 pwn kernel challenge
https://blog.itarow.xyz/posts/mctf_2025_sec_mem/
https://blog.itarow.xyz/posts/mctf_2025_sec_mem/
blog.itarow.xyz
MCTF 2025 - Write-up Sec Mem - Pwn
Write-up - Sec Mem This is the write-up for the challenge Sec Mem which is an AARCH64 pwn kernel challenge I created for midnight flag CTF 2025 quals. It involves bypassing PAC in the Linux kernel.
Description During your quest, you come across a machine…
Description During your quest, you come across a machine…
Ебанутый рандомный вопрос посреди недели. Вы ставите будильник на выходные?
Final Results
52%
Да
48%
Нет
Case Study: IOMobileFramebuffer NULL Pointer Dereference
https://afine.com/case-study-iomobileframebuffer-null-pointer-dereference/
https://afine.com/case-study-iomobileframebuffer-null-pointer-dereference/
AFINE - digitally secure
Case Study: IOMobileFramebuffer NULL Pointer Dereference - AFINE - digitally secure
Learn how broken access and Null Pointer Dereference were found in the macOS IOMobileFramebuffer (AppleCLCD2) driver.
A powerful, modular, lightweight and efficient command & control framework written in Nim.
https://github.com/hdbreaker/Nimhawk
https://github.com/hdbreaker/Nimhawk
GitHub
GitHub - hdbreaker/Nimhawk: A powerful, modular, lightweight and efficient command & control framework written in Nim.
A powerful, modular, lightweight and efficient command & control framework written in Nim. - hdbreaker/Nimhawk
Building Own MCP - Augmented LLM for Threat Hunting
https://tierzerosecurity.co.nz/2025/04/29/mcp-llm.html
https://tierzerosecurity.co.nz/2025/04/29/mcp-llm.html
Tier Zero Security
Information Security Services. Offensive Security, Penetration Testing, Mobile and Application, Purple Team, Red Team
GRUB2-based Bootkit: New Malware Threat Suspected to be Linked to the NSA's Equation Group
https://mp.weixin.qq.com/s/TgSWYEbkV0dq-ukNDUESOA?poc_token=HGTYEWijnsqGF-W1hh98Ok6OCoyWOjx7MnHYbUMp
https://mp.weixin.qq.com/s/TgSWYEbkV0dq-ukNDUESOA?poc_token=HGTYEWijnsqGF-W1hh98Ok6OCoyWOjx7MnHYbUMp
Tracing and Manipulating Anti-Analysis Techniques with DynamoRIO
https://0xreverse.com/tracing-and-manipulating-anti-analysis-techniques-with-dynamorio
https://0xreverse.com/tracing-and-manipulating-anti-analysis-techniques-with-dynamorio
iOS 18.5 Beta 4(and below) MobileCoreService persistence exploit
https://github.com/seanistethered/EvilWorkspace
https://github.com/seanistethered/EvilWorkspace
GitHub
GitHub - cr4zyengineer/EvilWorkspace: iOS 18.5 Beta 4(and below) MobileCoreService persistence exploit. Discovered by me!
iOS 18.5 Beta 4(and below) MobileCoreService persistence exploit. Discovered by me! - cr4zyengineer/EvilWorkspace