🎄Розыгрыш! 🎄
Условия: быть подписанным на этот канал
Призы: Первое место - промокод на 200$, остальным по 50$ (Hack The Box Gift Card). Можно потратить как на Labs, так и на Academy.
Количество победителей: 5
Принцип отбора: рандомно, с помощью бота
Подведение итогов: 31.03.2025 18:00 (UTC+5)
—————————————————
🎄Giveaway! 🎄
Conditions: You must be subscribed to this channel.
Prizes: First place - 200$, others - 50$ Hack The Box Gift Card (can be used on both Labs and Academy).
Number of Winners: 5
Selection Method: Random draw using a bot.
Results Announcement: 31.03.2025 18:00 (UTC+5)
Условия: быть подписанным на этот канал
Призы: Первое место - промокод на 200$, остальным по 50$ (Hack The Box Gift Card). Можно потратить как на Labs, так и на Academy.
Количество победителей: 5
Принцип отбора: рандомно, с помощью бота
Подведение итогов: 31.03.2025 18:00 (UTC+5)
—————————————————
🎄Giveaway! 🎄
Conditions: You must be subscribed to this channel.
Prizes: First place - 200$, others - 50$ Hack The Box Gift Card (can be used on both Labs and Academy).
Number of Winners: 5
Selection Method: Random draw using a bot.
Results Announcement: 31.03.2025 18:00 (UTC+5)
Order of Six Angles
🎄Розыгрыш! 🎄 Условия: быть подписанным на этот канал Призы: Первое место - промокод на 200$, остальным по 50$ (Hack The Box Gift Card). Можно потратить как на Labs, так и на Academy. Количество победителей: 5 Принцип отбора: рандомно, с помощью бота …
1. phph (@Staywithve)
2. Eugen
3. Khaldun (@Koldyn2193)
4. n (@jetpacula)
5. m4lc0de (@m4lc0de)
Please open Telegram to view this post
VIEW IN TELEGRAM
Full spectrum Event Tracing for Windows detection in the kernel against rootkits
https://fluxsec.red/full-spectrum-event-tracing-for-windows-detection-in-the-kernel-against-rootkits
https://fluxsec.red/full-spectrum-event-tracing-for-windows-detection-in-the-kernel-against-rootkits
fluxsec.red
Full Spectrum ETW Detection in Windows Kernel: Advanced Rootkit Countermeasures
In this in-depth guide, uncover the technical strategies behind full spectrum ETW detection in Windows kernel. Discover how innovative methods in Sanctum EDR thwart rootkit evasion techniques.
Преза
GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev
GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev
GitHub
REcon2024-GOP-Complex/REcon2024-slides-GOP-Complex/GOPComplexREcon2024-ic3qu33n.pdf at main · ic3qu33n/REcon2024-GOP-Complex
REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev"" - ic3qu33n/REcon2024-GOP-Complex
Automated AI Malware Reverse Engineering with MCPs for IDA and Ghidra
https://x.com/i/status/1907453048491802830
https://x.com/i/status/1907453048491802830
X (formerly Twitter)
herrcore (@herrcore) on X
Automated AI Malware Reverse Engineering with MCPs for IDA and Ghidra
Full VIBE RE livestream 🏝️
Full VIBE RE livestream 🏝️
The Exploit Development Life Cycle: From Concept to Compromise
https://www.youtube.com/watch?v=ce0bXORSMX4
https://www.youtube.com/watch?v=ce0bXORSMX4
YouTube
KEYNOTE: The Exploit Development Life Cycle: From Concept to Compromise, Valentina Palmiotti
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
Hooking Context Swaps with ETW
https://archie-osu.github.io/etw/hooking/2025/04/09/hooking-context-swaps-with-etw.html
https://archie-osu.github.io/etw/hooking/2025/04/09/hooking-context-swaps-with-etw.html
Archie’s reversing diary
Hooking Context Swaps with ETW
Event Tracing for Windows (ETW) is a kernel mechanism designed to log certain activity happening in the system. Despite its seemingly innocuous denoscription, ETW can be a valuable source of information and a very interesting hook point for both anti-cheats…
JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and DCI/EXDI
https://www.youtube.com/watch?v=YKFXWsVRL1w&list=PLcwesr-0gPLozUKhGOiiACc4LZ2rTLhBh&index=9
https://www.youtube.com/watch?v=YKFXWsVRL1w&list=PLcwesr-0gPLozUKhGOiiACc4LZ2rTLhBh&index=9
YouTube
Recon2024 - Alan Sguigna&Ivan Rouzanov - JTAGDebugOfWindowsHyper VSecureKernelWithWinDbgAndDCIEXDI
For the first time, JTAG debugging tools for x64 are available to the general public. Using EXDI to connect WinDbg with the SourcePoint debugger, and Intel Direct Connect Interface (DCI) on the AAEON UP Xtreme i11, Windows Hyper-V and Secure Kernel can be…
write-up for the challenge Sec Mem which is an AARCH64 pwn kernel challenge
https://blog.itarow.xyz/posts/mctf_2025_sec_mem/
https://blog.itarow.xyz/posts/mctf_2025_sec_mem/
blog.itarow.xyz
MCTF 2025 - Write-up Sec Mem - Pwn
Write-up - Sec Mem This is the write-up for the challenge Sec Mem which is an AARCH64 pwn kernel challenge I created for midnight flag CTF 2025 quals. It involves bypassing PAC in the Linux kernel.
Denoscription During your quest, you come across a machine…
Denoscription During your quest, you come across a machine…
Ебанутый рандомный вопрос посреди недели. Вы ставите будильник на выходные?
Final Results
52%
Да
48%
Нет
Case Study: IOMobileFramebuffer NULL Pointer Dereference
https://afine.com/case-study-iomobileframebuffer-null-pointer-dereference/
https://afine.com/case-study-iomobileframebuffer-null-pointer-dereference/
AFINE - digitally secure
Case Study: IOMobileFramebuffer NULL Pointer Dereference - AFINE - digitally secure
Learn how broken access and Null Pointer Dereference were found in the macOS IOMobileFramebuffer (AppleCLCD2) driver.
A powerful, modular, lightweight and efficient command & control framework written in Nim.
https://github.com/hdbreaker/Nimhawk
https://github.com/hdbreaker/Nimhawk
GitHub
GitHub - hdbreaker/Nimhawk: A powerful, modular, lightweight and efficient command & control framework written in Nim.
A powerful, modular, lightweight and efficient command & control framework written in Nim. - hdbreaker/Nimhawk