Alexandre Becholey Profile
Alexandre Becholey

@0xabe_io

Followers
439
Following
2K
Media
10
Statuses
1K

https://t.co/r01xa2EjKc

Joined December 2012
Don't wanna be here? Send us removal request.
@0xabe_io
Alexandre Becholey
7 days
RT @_tsuro: If you like Chrome IPC shenanigans like this, you might also enjoy my talk from black hat 25:
0
34
0
@0xabe_io
Alexandre Becholey
8 days
RT @OutflankNL: Black Hat Bonus: Learn more about @kyleavery_ 's research on training self-hosted LLMs to generate evasive malware and crea….
0
46
0
@0xabe_io
Alexandre Becholey
9 days
RT @33y0re: My slides are available now! Thank you @alexjplaskett !!!.
0
22
0
@0xabe_io
Alexandre Becholey
12 days
RT @R00tkitSMM: 𝗖𝗩𝗘-𝟮𝟬𝟮𝟱-𝟮𝟳𝟬𝟲𝟮 is one of my favorite Linux kernel vulnerabilities that we have discovered/exploited together with my brilli….
0
17
0
@0xabe_io
Alexandre Becholey
1 month
RT @mathias_fuchs: Attackers love RDP for sneaky lateral moves—but every pixel leaves a clue! 🕵️‍♂️ Check out my latest blog on tracking at….
Tweet card summary image
medium.com
Introduction
0
87
0
@0xabe_io
Alexandre Becholey
1 month
RT @r0keb: Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, interna….
r0keb.github.io
Good morning! In today’s blog post we’re going to dive into a topic that has interested me for quite some time, the Windows kernel pool. It’s a topic that tends to have “scarce” documentation online...
0
135
0
@0xabe_io
Alexandre Becholey
2 months
RT @hexacon_fr: We've already received many high-quality submissions to our CFP, thank you! 🚀. Don't miss your chance to submit before July….
Tweet card summary image
hexacon.fr
CFP is open for business!
0
11
0
@0xabe_io
Alexandre Becholey
2 months
RT @pedrib1337: We are looking for a junior security researcher 🤠 .No university degree or previous work experience required, but MUST be….
0
92
0
@0xabe_io
Alexandre Becholey
2 months
There is a lot of new content and we are pretty sure you will enjoy it. You can have a sneak peak on the V8 type confusion module I added to section 2 on the Off by One Security stream:
@Steph3nSims
Stephen Sims
2 months
We *JUST* finished the SANS SEC760: Advanced Exploit Development course updates. Myself, along with @0xabe_io! We are recording this version in a couple of weeks and it will start running in late July. I'll tweet when we get the new syllabus updated. Bedtime. .
0
1
8
@0xabe_io
Alexandre Becholey
3 months
RT @alexjplaskett: Bypassing kASLR via Cache Timing by @r0keb.
Tweet media one
0
26
0
@0xabe_io
Alexandre Becholey
3 months
RT @alexjplaskett: Fuzzing Windows Defender with loadlibrary in 2025.
Tweet media one
Tweet media two
0
63
0
@0xabe_io
Alexandre Becholey
3 months
RT @BackEngineerLab: Given the recent events with VMPSoft DMCA'ing educational YouTube videos demonstrating how to unpack malware protected….
0
135
0
@0xabe_io
Alexandre Becholey
3 months
RT @dillon_franke: Thrilled to announce my new Project Zero blog post is LIVE! 🎉 I detail my knowledge-driven fuzzing process to find sandb….
0
105
0
@0xabe_io
Alexandre Becholey
4 months
RT @silviocesare: We’re hiring Vulnerability Researchers at @infosectcbr that specialise in Linux, OS kernels, Android, and embedded/IoT. W….
0
41
0
@0xabe_io
Alexandre Becholey
4 months
RT @call_eax: Just watched the Introduction to JavaScript and V8 for Browser Exploitation with @Steph3nSims and @0xabe_io . Honestly thi….
0
3
0
@0xabe_io
Alexandre Becholey
4 months
RT @FuzzySec: I'm reposting my IBM blog dealing with Lazarus and "Direct kernel object manipulation (DKOM) attacks on ETW providers" on kni….
0
41
0
@0xabe_io
Alexandre Becholey
4 months
This basic block representation of a function can be quite useful.
@wmessmer
William R. Messmer
4 months
Clicking this will bring up a graph view of the control flow of the function. Think of it as a visual representation of the 'uf' command:
Tweet media one
0
0
0
@0xabe_io
Alexandre Becholey
4 months
RT @wmessmer: Clicking this will bring up a graph view of the control flow of the function. Think of it as a visual representation of the….
0
4
0