Intel80x86 Profile Banner
Sinaei Profile
Sinaei

@Intel80x86

Followers
9K
Following
18K
Media
73
Statuses
796

Windows Internals enthusiast, Interested in hardware design & low-level programming. An active developer of @HyperDbg debugger. https://t.co/TUALkTusHt

Joined July 2012
Don't wanna be here? Send us removal request.
@Intel80x86
Sinaei
5 months
I'm happy to announce that @HyperDbg v0.14 is released! This version includes HyperEvade (beta preview), fixes Win11 24H2 compatibility issues, and adds multiple timing functions to the script engine (Special thanks to @0Xiphorus). Check it out: https://t.co/27biDbzvDs (1/3)
1
24
68
@S4l3hh
Saleh
10 days
Our paper "TRM: The Reversing Machine" has been accepted to @asiaccs2026! TRM is developed on top of @HyperDbg and exposes stealthy sub-OS malware using transparent hypervisor introspection, detecting threats missed by 24 AV engines. Preprint https://t.co/TYomqGJiV1 @Intel80x86
Tweet card summary image
arxiv.org
Existing anti-malware software and reverse engineering toolkits struggle with stealthy sub-OS rootkits due to limitations of run-time kernel-level monitoring. A malicious kernel-level driver can...
0
3
19
@HyperDbg
HyperDbg
1 month
HyperDbg v0.17 is out! โœจ๐Ÿฅ‚ This update brings major improvements to the script engine, including multidimensional arrays, compound & multiple assignments, plus key interpretation bug fixes. Check it out: https://t.co/Z27NdxkrDO
Tweet card summary image
github.com
HyperDbg v0.17 is released! If youโ€™re enjoying HyperDbg, donโ€™t forget to give a star ๐ŸŒŸ on GitHub! Please visit Build & Install to configure the environment for running HyperDbg. Check out the Q...
1
5
14
@Intel80x86
Sinaei
2 months
๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅโŒ›๏ธ
@0Xiphorus
Bjรถrn Ruytenberg
2 months
0b6732a0b1f608cfaf48baa926b781dbcb653a9979901788310010719f6f5fd3632d47c09da3446ae461f03e12e421ee e10451e60a858a98a8f3ddb2ec9c414516d404f43299f67d45b0dd9e9c9f14470c13937c13fc2f7d3434758cd88b39fc
0
0
2
@ArastehCma
Simaei
2 months
Ever wondered what happens when LLMs come to life? In my latest video, I turned popular open source LLMs into animated characters! ๐Ÿฆ™๐Ÿณโœจ Theyโ€™re the prerequisites for my upcoming series on binary analysis and reverse engineering. ๐Ÿงฉ๐Ÿ‘€ Check it out: https://t.co/fC3U0Lmm34
0
3
6
@FuzzingLabs
FuzzingLabs
2 months
๐Ÿš€ We're excited to announce the release of FuzzForge Open Source (OSS)! FuzzForge is our open-source platform designed to automate offensive security workflows & AI Agents, from static analysis to fuzzing, debugging, and root cause analysis, all with AI assistance. ๐Ÿ”ท
1
23
52
@OpenSecTraining
OpenSecurityTraining2
3 months
The release of the "Trusted Computing 1102: Intermediate Trusted Platform Module (TPM) usage" class ( https://t.co/v1zC5XuaLg) has updated 3 #OST2 learning paths: "Secure Software Design & Implementation" - https://t.co/KVHI4Ue6mZ "System Security" - https://t.co/IwPgn1YzEx
0
6
21
@hasherezade
hasherezade
3 months
4
49
162
@MalFuzzer
Uriel Kosayev
3 months
๐Ÿš€ Itโ€™s official โ€” my new book is live on Amazon: MAoS โ€“ Malware Analysis on Steroids This book is not like the others. Itโ€™s built on years of raw, hands-on research, reverse engineering sessions at 3 AM, and real-world incident response cases. Inside, youโ€™ll find full Aโ€“Z
53
208
1K
@RobbieDumitru
Robbie Dumitru
3 months
Chypnosis: Undervolting-based Static Side-channel Attacks to appear in @IEEESSP Precisely dropping chip voltage disables clocks/sensors but retains data, enabling static SCA extraction With Kyle Mitard, @S4l3hh, Fatemeh Dana, @yuvalyarom & Shahin Tajik https://t.co/OUCfnvQ4B9
1
6
8
@R00tkitSMM
Meysam
3 months
Another CVE/exploit that might have worked regardless of MTE :) โ†’ https://t.co/DkWsOLXQWS it hijacks Apple GPU firmware โ†’ GPU gains full RAM R/W. MTE only guards CPU loads/stores, GPU DMA is outside of its scope.
Tweet card summary image
github.com
CVE-2022-32947 walkthough and demo. Contribute to asahilina/agx-exploit development by creating an account on GitHub.
@R00tkitSMM
Meysam
3 months
Iโ€™ve brought you a real iOS MTE bypass retrospectively: the overflow happens inside the co-processor (no MTE), then abuses trusted RPCs to gain kernel R/W โ€” sidestepping MTE on the AP entirely. https://t.co/r54afStxXb
4
37
250
@33y0re
Connor McGarr
3 months
Today I am releasing a new blog post on VSM "secure calls" + the SkBridge project to manually issue them!! This blog talks about how VTL 0 requests the services of VTL 1 and outlines common secure call patterns!!! Blog: https://t.co/xzB1s7HoPO SkBridge: https://t.co/0zO0E1L4Sy
3
100
259
@ArastehCma
Simaei
3 months
New video in my LLM for Reverse Engineering series! ๐Ÿ“บโœจ This time, I dive into Hugging Face, LM-Eval-Harness & AI leaderboards, the backbone of measuring and tracking modern AI progress. Watch here: https://t.co/RGu6jhz7Mi
0
7
17
@HyperDbg
HyperDbg
3 months
HyperDbg v0.16 is released! ๐Ÿž๐Ÿ’ซโœจ This version adds a new event command '!xsetbv', along with bug fixes, performance improvements, and progress on the user-mode debugger in VMI mode. Check it out: https://t.co/ODjAyWhsJC
Tweet card summary image
github.com
HyperDbg v0.16 is released! If youโ€™re enjoying HyperDbg, donโ€™t forget to give a star ๐ŸŒŸ on GitHub! Please visit Build & Install to configure the environment for running HyperDbg. Check out the Q...
1
15
64
@AlanSguigna
Alan Sguigna
3 months
Part 1 of my article series on fine-tuning an LLM for analysis of massive amounts of Intel Processor Trace is up. Use cases: codebase vulnerability scan, at-scale bug triage, etc. With thanks to @33y0re, @ivanrouzanov, and @vGPUArthur: https://t.co/fx5AdiQR4M
2
18
55
@bruce30262
Bruce Chen
4 months
Made a pwn challenge for this yearโ€™s HITCON CTF, which required participants to bypass PAC, BTI, and deal with relative vtables. Hereโ€™s the write-up: https://t.co/5IrEynUF3T Check it out if you're interested๐Ÿ™‚
bruce30262.github.io
Intro It all started when CK asked me if I could create challenges for this yearโ€™s HITCON CTF. As a retired CTF player, I initially replied, โ€œWellโ€ฆ maybe? Iโ€™ll see what I can come up with, but...
0
44
194
@R00tkitSMM
Meysam
4 months
My timeline is full of ๐—ถ๐—ข๐—ฆ ๐Ÿฌ-๐—ฐ๐—น๐—ถ๐—ฐ๐—ธ ๐—ฒ๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜ again. If youโ€™re new to these bugs, check out my write-up on my own fuzzing experience with ๐—œ๐—บ๐—ฎ๐—ด๐—ฒ๐—œ๐—ข from last year. https://t.co/FVgmlTk7lP
r00tkitsmm.github.io
ImageIO is Appleโ€™s Framework that handles image parsing, which exposes 0click attack surface
2
86
426
@ArastehCma
Simaei
4 months
New video released! ๐ŸŽ‰โœจ This video is an introduction to different types of LLMs, commercial vs. open-source. Understanding these differences is one of the prerequisites for applying LLMs in reverse engineering and binary analysis. Link:
0
12
47
@HyperDbg
HyperDbg
4 months
HyperDbg v0.15 is out! โœจ๐ŸŽˆ This version comes with a new SMM interrupt (SMI) command, fixing issues with Intel CET emulation for SYSCALL/SYSRET on 11th Gen+ (Tiger/Rocket Lake) CPUs, also saving/restoring XMM registers on VM-exits/entries. Check it out: https://t.co/dlH2K8hbas
3
23
76
@lwefnlef
moshtaba
5 months
๐Ÿš€ New update to emudbg: Now supports analyzing & debugging multi-threaded programs with full thread simulation and inspection ๐Ÿงต๐Ÿง  Ideal for reverse engineers & emulator devs! ๐Ÿ’ก Lightweigh ๐Ÿ› ๏ธ CLI-based ๐Ÿ”ฌ Precise thread analysis Check it out ๐Ÿ‘‡ ๐Ÿ”—
Tweet card summary image
github.com
A fast Windows emulator + debugger for reverse engineering. Runs any executable in debug mode, disassembles with Zydis, emulates instructions, and skips Windows API calls via debugger for maximum s...
0
3
29