❤1
Reversing Microsoft Defender's Signatures for Evasion
https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world
@reverseengine
https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world
@reverseengine
❤1
Exploiting Windows Kernel
CVE-2023–28218
https://theori.io/blog/exploiting-windows-kernel-wild-copy-with-user-fault-handling-cve-2023-28218
@reverseengine
CVE-2023–28218
https://theori.io/blog/exploiting-windows-kernel-wild-copy-with-user-fault-handling-cve-2023-28218
@reverseengine
theori.io
Exploiting Windows Kernel Wild Copy With User Fault Handling (CVE-2023–28218) - Theori BLOG
At Hexacon 2023, we presented our Windows kernel security research, uncovering CVE-2023-28218, a heap overflow in afd.sys. Read our exploit analysis and methodology. | Vulnerability Research
❤1
Hypervisors for Memory Introspection and Reverse Engineering
https://secret.club/2025/06/02/hypervisors-for-memory-introspection-and-reverse-engineering.html
@reverseengine
https://secret.club/2025/06/02/hypervisors-for-memory-introspection-and-reverse-engineering.html
@reverseengine
secret club
Hypervisors for Memory Introspection and Reverse Engineering
Introduction
❤1
Ghidra Bare Metal Frimware Analysis
https://blog.attify.com/analyzing-bare-metal-firmware-binaries-in-ghidra
@reverseengine
https://blog.attify.com/analyzing-bare-metal-firmware-binaries-in-ghidra
@reverseengine
Attify Blog - IoT Security, Pentesting and Exploitation
Ghidra bare metal firmware analysis
Reverse engineering firmware binaries often entails going through the datasheet, compiler headers to set up the base address and memory map correctly.
❤1
Native Function and Assembly Code Invocation
https://research.checkpoint.com/2022/native-function-and-assembly-code-invocation
@reverseengine
https://research.checkpoint.com/2022/native-function-and-assembly-code-invocation
@reverseengine
Check Point Research
Native function and Assembly Code Invocation - Check Point Research
Introduction For a reverse engineer, the ability to directly call a function from the analyzed binary can be a shortcut that bypasses a lot of grief. While in some cases it is just possible to understand the function logic and reimplement it in a higher-level…
❤1
LayeredSyscall – Abusing VEH to Bypass EDRs
https://whiteknightlabs.com/2024/07/31/layeredsyscall-abusing-veh-to-bypass-edrs
@reverseengine
https://whiteknightlabs.com/2024/07/31/layeredsyscall-abusing-veh-to-bypass-edrs
@reverseengine
White Knight Labs
LayeredSyscall - Abusing VEH to Bypass EDRs | White Knight Labs
Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR hooks in Windows.
❤2