JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and DCI/EXDI
https://www.youtube.com/watch?v=YKFXWsVRL1w&list=PLcwesr-0gPLozUKhGOiiACc4LZ2rTLhBh&index=9
https://www.youtube.com/watch?v=YKFXWsVRL1w&list=PLcwesr-0gPLozUKhGOiiACc4LZ2rTLhBh&index=9
YouTube
Recon2024 - Alan Sguigna&Ivan Rouzanov - JTAGDebugOfWindowsHyper VSecureKernelWithWinDbgAndDCIEXDI
For the first time, JTAG debugging tools for x64 are available to the general public. Using EXDI to connect WinDbg with the SourcePoint debugger, and Intel Direct Connect Interface (DCI) on the AAEON UP Xtreme i11, Windows Hyper-V and Secure Kernel can be…
write-up for the challenge Sec Mem which is an AARCH64 pwn kernel challenge
https://blog.itarow.xyz/posts/mctf_2025_sec_mem/
https://blog.itarow.xyz/posts/mctf_2025_sec_mem/
blog.itarow.xyz
MCTF 2025 - Write-up Sec Mem - Pwn
Write-up - Sec Mem This is the write-up for the challenge Sec Mem which is an AARCH64 pwn kernel challenge I created for midnight flag CTF 2025 quals. It involves bypassing PAC in the Linux kernel.
Description During your quest, you come across a machine…
Description During your quest, you come across a machine…
Ебанутый рандомный вопрос посреди недели. Вы ставите будильник на выходные?
Final Results
52%
Да
48%
Нет
Case Study: IOMobileFramebuffer NULL Pointer Dereference
https://afine.com/case-study-iomobileframebuffer-null-pointer-dereference/
https://afine.com/case-study-iomobileframebuffer-null-pointer-dereference/
AFINE - digitally secure
Case Study: IOMobileFramebuffer NULL Pointer Dereference - AFINE - digitally secure
Learn how broken access and Null Pointer Dereference were found in the macOS IOMobileFramebuffer (AppleCLCD2) driver.
A powerful, modular, lightweight and efficient command & control framework written in Nim.
https://github.com/hdbreaker/Nimhawk
https://github.com/hdbreaker/Nimhawk
GitHub
GitHub - hdbreaker/Nimhawk: A powerful, modular, lightweight and efficient command & control framework written in Nim.
A powerful, modular, lightweight and efficient command & control framework written in Nim. - hdbreaker/Nimhawk
Building Own MCP - Augmented LLM for Threat Hunting
https://tierzerosecurity.co.nz/2025/04/29/mcp-llm.html
https://tierzerosecurity.co.nz/2025/04/29/mcp-llm.html
Tier Zero Security
Information Security Services. Offensive Security, Penetration Testing, Mobile and Application, Purple Team, Red Team
GRUB2-based Bootkit: New Malware Threat Suspected to be Linked to the NSA's Equation Group
https://mp.weixin.qq.com/s/TgSWYEbkV0dq-ukNDUESOA?poc_token=HGTYEWijnsqGF-W1hh98Ok6OCoyWOjx7MnHYbUMp
https://mp.weixin.qq.com/s/TgSWYEbkV0dq-ukNDUESOA?poc_token=HGTYEWijnsqGF-W1hh98Ok6OCoyWOjx7MnHYbUMp
Tracing and Manipulating Anti-Analysis Techniques with DynamoRIO
https://0xreverse.com/tracing-and-manipulating-anti-analysis-techniques-with-dynamorio
https://0xreverse.com/tracing-and-manipulating-anti-analysis-techniques-with-dynamorio
iOS 18.5 Beta 4(and below) MobileCoreService persistence exploit
https://github.com/seanistethered/EvilWorkspace
https://github.com/seanistethered/EvilWorkspace
GitHub
GitHub - cr4zyengineer/EvilWorkspace: iOS 18.5 Beta 4(and below) MobileCoreService persistence exploit. Discovered by me!
iOS 18.5 Beta 4(and below) MobileCoreService persistence exploit. Discovered by me! - cr4zyengineer/EvilWorkspace
Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages
https://googleprojectzero.blogspot.com/2025/05/breaking-sound-barrier-part-i-fuzzing.html
https://googleprojectzero.blogspot.com/2025/05/breaking-sound-barrier-part-i-fuzzing.html
projectzero.google
Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages - Project Zero
Guest post by Dillon Franke, Senior Security Engineer, 20% time on Project Zero Every second, highly-privileged MacOS system daemons accept and proces...