Sinaei
@Intel80x86
Followers
9K
Following
18K
Media
73
Statuses
796
Windows Internals enthusiast, Interested in hardware design & low-level programming. An active developer of @HyperDbg debugger. https://t.co/TUALkTusHt
Joined July 2012
I'm happy to announce that @HyperDbg v0.14 is released! This version includes HyperEvade (beta preview), fixes Win11 24H2 compatibility issues, and adds multiple timing functions to the script engine (Special thanks to @0Xiphorus). Check it out: https://t.co/27biDbzvDs (1/3)
1
24
68
Our paper "TRM: The Reversing Machine" has been accepted to @asiaccs2026! TRM is developed on top of @HyperDbg and exposes stealthy sub-OS malware using transparent hypervisor introspection, detecting threats missed by 24 AV engines. Preprint https://t.co/TYomqGJiV1
@Intel80x86
arxiv.org
Existing anti-malware software and reverse engineering toolkits struggle with stealthy sub-OS rootkits due to limitations of run-time kernel-level monitoring. A malicious kernel-level driver can...
0
3
19
The paper link is below, and weโll be releasing the benchmark and source code very soon! Paper Link:
arxiv.org
Data-flow analysis is a critical component of security research. Theoretically, accurate data-flow analysis in binary executables is an undecidable problem, due to complexities of binary code....
0
3
8
HyperDbg v0.17 is out! โจ๐ฅ This update brings major improvements to the script engine, including multidimensional arrays, compound & multiple assignments, plus key interpretation bug fixes. Check it out: https://t.co/Z27NdxkrDO
github.com
HyperDbg v0.17 is released! If youโre enjoying HyperDbg, donโt forget to give a star ๐ on GitHub! Please visit Build & Install to configure the environment for running HyperDbg. Check out the Q...
1
5
14
Ever wondered what happens when LLMs come to life? In my latest video, I turned popular open source LLMs into animated characters! ๐ฆ๐ณโจ Theyโre the prerequisites for my upcoming series on binary analysis and reverse engineering. ๐งฉ๐ Check it out: https://t.co/fC3U0Lmm34
0
3
6
๐ We're excited to announce the release of FuzzForge Open Source (OSS)! FuzzForge is our open-source platform designed to automate offensive security workflows & AI Agents, from static analysis to fuzzing, debugging, and root cause analysis, all with AI assistance. ๐ท
1
23
52
The release of the "Trusted Computing 1102: Intermediate Trusted Platform Module (TPM) usage" class ( https://t.co/v1zC5XuaLg) has updated 3 #OST2 learning paths: "Secure Software Design & Implementation" - https://t.co/KVHI4Ue6mZ "System Security" - https://t.co/IwPgn1YzEx
0
6
21
Updated #PEsieve / #HollowsHunter / #MalUnpack: https://t.co/eXE9fFAzAp / https://t.co/FBWjtKp8ez / https://t.co/5YkrCaheEm - check them out ๐
4
49
162
๐ Itโs official โ my new book is live on Amazon: MAoS โ Malware Analysis on Steroids This book is not like the others. Itโs built on years of raw, hands-on research, reverse engineering sessions at 3 AM, and real-world incident response cases. Inside, youโll find full AโZ
53
208
1K
Chypnosis: Undervolting-based Static Side-channel Attacks to appear in @IEEESSP Precisely dropping chip voltage disables clocks/sensors but retains data, enabling static SCA extraction With Kyle Mitard, @S4l3hh, Fatemeh Dana, @yuvalyarom & Shahin Tajik https://t.co/OUCfnvQ4B9
1
6
8
Another CVE/exploit that might have worked regardless of MTE :) โ https://t.co/DkWsOLXQWS it hijacks Apple GPU firmware โ GPU gains full RAM R/W. MTE only guards CPU loads/stores, GPU DMA is outside of its scope.
github.com
CVE-2022-32947 walkthough and demo. Contribute to asahilina/agx-exploit development by creating an account on GitHub.
Iโve brought you a real iOS MTE bypass retrospectively: the overflow happens inside the co-processor (no MTE), then abuses trusted RPCs to gain kernel R/W โ sidestepping MTE on the AP entirely. https://t.co/r54afStxXb
4
37
250
Today I am releasing a new blog post on VSM "secure calls" + the SkBridge project to manually issue them!! This blog talks about how VTL 0 requests the services of VTL 1 and outlines common secure call patterns!!! Blog: https://t.co/xzB1s7HoPO SkBridge: https://t.co/0zO0E1L4Sy
3
100
259
New video in my LLM for Reverse Engineering series! ๐บโจ This time, I dive into Hugging Face, LM-Eval-Harness & AI leaderboards, the backbone of measuring and tracking modern AI progress. Watch here: https://t.co/RGu6jhz7Mi
0
7
17
HyperDbg v0.16 is released! ๐๐ซโจ This version adds a new event command '!xsetbv', along with bug fixes, performance improvements, and progress on the user-mode debugger in VMI mode. Check it out: https://t.co/ODjAyWhsJC
github.com
HyperDbg v0.16 is released! If youโre enjoying HyperDbg, donโt forget to give a star ๐ on GitHub! Please visit Build & Install to configure the environment for running HyperDbg. Check out the Q...
1
15
64
Part 1 of my article series on fine-tuning an LLM for analysis of massive amounts of Intel Processor Trace is up. Use cases: codebase vulnerability scan, at-scale bug triage, etc. With thanks to @33y0re, @ivanrouzanov, and @vGPUArthur: https://t.co/fx5AdiQR4M
2
18
55
Made a pwn challenge for this yearโs HITCON CTF, which required participants to bypass PAC, BTI, and deal with relative vtables. Hereโs the write-up: https://t.co/5IrEynUF3T Check it out if you're interested๐
bruce30262.github.io
Intro It all started when CK asked me if I could create challenges for this yearโs HITCON CTF. As a retired CTF player, I initially replied, โWellโฆ maybe? Iโll see what I can come up with, but...
0
44
194
My timeline is full of ๐ถ๐ข๐ฆ ๐ฌ-๐ฐ๐น๐ถ๐ฐ๐ธ ๐ฒ๐
๐ฝ๐น๐ผ๐ถ๐ again. If youโre new to these bugs, check out my write-up on my own fuzzing experience with ๐๐บ๐ฎ๐ด๐ฒ๐๐ข from last year. https://t.co/FVgmlTk7lP
r00tkitsmm.github.io
ImageIO is Appleโs Framework that handles image parsing, which exposes 0click attack surface
2
86
426
New video released! ๐โจ This video is an introduction to different types of LLMs, commercial vs. open-source. Understanding these differences is one of the prerequisites for applying LLMs in reverse engineering and binary analysis. Link:
0
12
47
HyperDbg v0.15 is out! โจ๐ This version comes with a new SMM interrupt (SMI) command, fixing issues with Intel CET emulation for SYSCALL/SYSRET on 11th Gen+ (Tiger/Rocket Lake) CPUs, also saving/restoring XMM registers on VM-exits/entries. Check it out: https://t.co/dlH2K8hbas
3
23
76
๐ New update to emudbg: Now supports analyzing & debugging multi-threaded programs with full thread simulation and inspection ๐งต๐ง Ideal for reverse engineers & emulator devs! ๐ก Lightweigh ๐ ๏ธ CLI-based ๐ฌ Precise thread analysis Check it out ๐ ๐
github.com
A fast Windows emulator + debugger for reverse engineering. Runs any executable in debug mode, disassembles with Zydis, emulates instructions, and skips Windows API calls via debugger for maximum s...
0
3
29