Developing on qemu and flashing to real hardware?
This is the STM32VLDISCOVERY board.
It has an ARM Cortex-M3 Processor on it.
Interesting thing about this board is - it has a QEMU implementation and so we can learn to program it without the actual hardware!
The fact that the…
Looks like Microsoft added such a "lsof" feature to fsutil.exe file queryProcessesUsing in Windows 11 24H2. 🥳
It uses the same Vista-old syscall I am using in my PowerShell script. The choice is yours :)
BTW I have created my script literally one month before 24H2 release. 😎
Looks like Microsoft added such a "lsof" feature to fsutil.exe file queryProcessesUsing in Windows 11 24H2. 🥳
It uses the same Vista-old syscall I am using in my PowerShell script. The choice is yours :)
BTW I have created my script literally one month before 24H2 release. 😎 https://t.co/fSKKGNt33Z
I wanted to end last year with a vm escape, took me a bit longer but I want to present you my latest public research:
A VM escape in Oracle VirtualBox using only one integer overflow bug!
This was fixed in April 15 and assigned CVE-2025-30712.
github.com/google/securit…
We've uploaded our stream from last Tuesday where we performed malware research with the MalwareBazaar MCP server from @mytechnotalent, unpacked a loader malware variant with x64dbg and analyzed it with the Binary Ninja MCP server: youtu.be/JYRuB0_FsFA enjoy!
WHAT?! 😂
If you provide /FS:FILESYSTEM parameter to the format[.]com utility, the resulting process will try to load ("U"+FILESYSTEM).DLL using the default search path...
The weirdest custom DLL launcher I have meet so far :D
Gave a talk on external fuzzing of Linux kernel USB drivers with syzkaller at SAFACon by @SAFATeamGmbH.
Includes a demonstration of how to rediscover CVE-2024-53104, an out-of-bounds bug in the USB Video Class driver.
Slides: docs.google.com/presentation/d…
3K Followers 1K FollowingMobile Security R&D by day | Saudi nationalist politician by night, whose ambition is to see his country 🇸🇦 lead the region #the_saudi_cyber_arms_company_2035
398 Followers 1K FollowingLike golf 🏌️♀️⛳️, motorcycles 🏍, food 🧇🍔🍜, reading 📕, fitness 💪, travel ✈️ and so on. If you also like it, I think we can communicate
54 Followers 325 FollowingAnalista de Ciberseguridad |Integrador en soluciones de Ciberseguridad | Especialista en Network | Trabajo Remoto | Consultorias 🕵- Aveces es bueno un shutdown
535 Followers 1K FollowingSelf employed and A security researcher publicly acknowledged by google, Microsoft, Apple, Nasa etc. @HackenProof Security Researcher
7K Followers 47 FollowingCapture the Flag Team from UC Santa Barbara's SECLAB and Arizona State University's SEFCOM. DARPA Cyber Grand Challenge 3rd Place. Phrack author. Let's hack!
21K Followers 278 FollowingI find and exploit 0day, develop OSes, hypervisors and emulators, design massively parallel data structures and code, and do precision machining! Optimization❤️
3K Followers 86 FollowingWe’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.
9K Followers 332 FollowingReverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
7K Followers 783 FollowingSecurity engineer at https://t.co/027VXUlgOx. Focusing on the Linux kernel. Maintaining @linkersec. Trainings at https://t.co/D5MrxmYimS.
3K Followers 1K FollowingWrite some shit code. CTF with @r3kapig. Do shit security research. Currently at University of California, San Diego. DEFCON 31/32/33 finalist | LOOKING FOR JOB
24K Followers 2 FollowingSSD provides the support you need to turn your experience uncovering security vulnerabilities into a highly paid career. [email protected]
20K Followers 271 FollowingOffensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
No recent Favorites. New Favorites will appear here.