
MachineHunter
@InfPCTechStack
Followers
365
Following
274
Media
190
Statuses
950
Security Researcher, UEFI, Windows Kernel, TPM (RT is mainly for me to read them later...)
Joined April 2019
Slides of my #BHUSA talk Shade BIOS has been uploaded!.. Github link is below Thank very much for attending my presentation!.I’m sorry I wasn’t able to talk to many of you, as I was feeling unwell throughout the #BlackHatEvents
1
8
21
RT @KuniSuzaki: メモ.Attestation readiness verifier for TPM reliability.Windows 11 24H2から試せるTPM Attestation?.イベントプロパテ….
techcommunity.microsoft.com
Enable system integrity with the new tool to enhance Trusted Platform Module (TPM) reliability for Windows 11.
0
3
0
RT @77777kusa: seccamp2025_LT_デコンパイラ研究最前線 .セキュリティキャンプ全国大会のLTでしゃべった内容です. デコンパイラの研究の現状に関してある程度まとめました. よろしくお願いします. #seccamp ..
speakerdeck.com
セキュリティキャンプ全国大会2025のLTで話した内容です
0
37
0
RT @alon_leviev: Just dropped a detailed blog post on our “BitUnlocker” research. If you’re into logical vulnerabilities and BitLocker by….
techcommunity.microsoft.com
Table of Contents Introduction BitLocker Overview WinRE Overview Attacking Boot.sdi Parsing Attacking ReAgent.xml Parsing Attacking Boot Configuration Data...
0
18
0
RT @wh1te4ever: Our Bootkitty team will announcing "A Stealthy Bootkit-Rootkit Against Modern Operating Systems" soon at USENIX WOOT25. St….
0
13
0
I plan to respond around August 13th or 14th. Thank you for your patience.
0
0
0
speakerdeck.com
0
25
0
Thank you for sending so many requests for the full source code for Shade BIOS presented at #BHUSA . I've been feeling pretty unwell lately, so I'll take a rest before replying. I apologize for the inconvenience, but I'd appreciate it if you could give me some time.
2
0
8
Presenting Shade BIOS at.August 6 (Wed) 13:30-14:10 Oceanside C, Level 2. Come talk to me and let’s discuss about UEFI security!.
Our talk at #BHUSA @BlackHatEvents Briefings has been accepted!. This is a presentation on an initiative to make the BIOS usable even after the OS has booted, enabling malbehavior to occur solely within the BIOS, independent of the OS.
0
0
11
RT @hardwear_io: #SecureBoot is supposed to keep your devices safe—like making sure only your keys can start your car. 🧐 But what if someon….
0
4
0
RT @KuniSuzaki: Paper.LiSB: Lightweight Secure Boot and Attestation Scheme for IoT and Edge Devices [IEEE Transactions on Information Foren….
ieeexplore.ieee.org
With the increasing popularity of small computing devices and applications of IoT, the need for platform integrity grows both in scale and scope. In particular, the detection of successful attempts...
0
1
0
RT @InstLatX64: #Intel projects 2025+ v53 .#PantherLake #NovaLakeU #NovaLakeS #RazerLake #TitanLake #BartlettLake #WildcatLake #GraniteRapi….
0
10
0
RT @gh0stbyt3: I made this tool that checks if drivers from are blocked by HVCI. It helps identify vulnerable drive….
0
7
0
RT @NikolajSchlej: Will be presenting my Hydroph0bia (CVE-2025-4275) research at OFFZONE ( 2025 on Aug 21st. It wil….
offzone.moscow
Международная конференция по практической кибербезопасности | 21–22 августа, Москва
0
5
0
RT @KuniSuzaki: memo.Hyper-V Virtual TPMs, Certificates, VM Export and Migration.Hyper-VでのTPMマイグレーションの解説。.vTPM関連の証明….
techcommunity.microsoft.com
Virtual Trusted Platform Modules (vTPM) in Hyper-V allow you to run guest operating systems, such as Windows 11 or Windows Server 2025 with security features...
0
4
0
RT @Yash3667: Help us improve SecureBoot at Apple! Join the team which works on core Apple technologies such as AppleImage4, AMFI, TXM, XNU….
jobs.apple.com
Apply for a Software Engineer, Trusted Execution (Secure Boot) job at Apple. Read about the role and find out if it’s right for you.
0
37
0
RT @gmhzxy: hyper-reV: A powerful memory introspection & reverse engineering hypervisor leveraging Hyper-V. Read/write guest memory, SLAT h….
github.com
memory introspection and reverse engineering hypervisor powered by leveraging Hyper-V - noahware/hyper-reV
0
52
0