Nox
@MrNox_
Followers
2K
Following
4K
Media
95
Statuses
11K
Casual CTF player at @id10t_ctf. Independent Vulnerability REsearcher, formerly @Immunityinc and @CoreSecurity.
Callao, Peru
Joined December 2010
I wrote a short blogpost about how to dump a firmware via UART and boot setup commands :D https://t.co/Kf0EbIlM2S También hay la versión en español :D
0
5
17
Just released🎉 Remote GUI debugger for Reverse Engineering. https://t.co/rqRo28k253
github.com
Next-Generation Remote Analysis Suite for Reverse Engineering. - DoranekoSystems/DynaDbg
5
60
481
Lesson 37: x86 Course (Part 37 - ASM Program 6 [CMOV Instructions]) - This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions. #ReverseEngineering
github.com
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures. - mytechnotalent/Reverse-Engineering
0
3
12
Four Bytes, One Lie: A SMAP-Free Confidence Trick on Kernel Pointers by Hyeonjin https://t.co/xybXA1svID
0
14
65
Lesson 36: x86 Course (Part 36 - ASM Hacking 5 [Indirect Addressing With Registers]) - This tutorial will address how to hack our fifth real Assembly Program by indirect addressing with registers. #ReverseEngineering
github.com
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures. - mytechnotalent/Reverse-Engineering
0
4
20
I found malware that embedded itself into an audio driver. It silently recorded from the system microphone and uploaded the compressed .wav files every 20 minutes. Using memory forensics and strings, I discovered a hidden process writing to a staged audio cache in %Temp%.
356
1K
13K
AdaptixC2 v0.11 is out! Feature updates, fixes, new BOFs, and 2 new community-contributed agents! Releass Notes: https://t.co/RqVxoYUFGy
1
49
253
🦔📹 New Video: Modifying @vinopaljiri's string decrypter for a ConfuserEx2 variant ➡️ Defeating antis with Harmony hooks ➡️ AsmResolver ➡️ .NET string deobfuscation #MalwareAnalysisForHedgehogs
https://t.co/G1mOunwcEq
2
36
99
Exploiting an N-day vulnerability in Qualcomm Adreno GPUs microcode https://t.co/o4ezSGPk6w
#infosec
3
47
293
Last month, @d_tranman and I gave a talk @MCTTP_Con called "COM to the Darkside" focusing on COM/DCOM cross-session and fileless lateral movement tradecraft. Check out the slides here: https://t.co/1KNln1ldzF Recording should be released soon.
github.com
Slides and resources from MCTTP 2025 Talk. Contribute to bohops/COM-to-the-Darkside development by creating an account on GitHub.
1
81
252
Exploiting LPE vulnerabilities in NVIDIA Linux Open GPU Kernel Modules by Robin Bastide (@quarkslab) https://t.co/IARbGJf0rQ
#infosec
1
25
132
User Account Control (UAC) bypass technique exploits a DLL Search Order hijacking vulnerability in the Microsoft iSCSI Initiator Configuration Tool (iscsicpl.exe). Allows arbitrary command execution with elevated privileges without triggering UAC prompts. https://t.co/mMx7dkbtbN
3
42
155
Announcing "MaleficentVM". Learn and practice your malware development skills in ctfish mode challenges in a lab VM. This VM contains 50 challenges designed to improve your user mode malware development techniques. #infosec #malware
https://t.co/UB9bIlgdqQ
github.com
This is practice VM for malware development. Contribute to winsecurity/MaleficentVM development by creating an account on GitHub.
8
120
542
I posted a short blog about how a Samsung GPU vulnerability (CVE-2025-21479) can be leveraged for an LPE on affected devices https://t.co/9tya9c37Ez
xploitbengineer.github.io
Motivation A couple of years ago, I picked up a few of Samsung S23’s at Pwn2Own.
6
79
251
PAC, BTI, and relative vtables bypass by @bruce30262 (HITCON CTF 2025) https://t.co/LZDFojees7
#infosec #ctf
0
20
101
This year @binarly_io has also expanded their sponsorship to the creation of a new Firmware Security Learning Path! This captures current and future plans for classes involving security in the deep-dark of firmware! But Binarly is starting to give visibility into what's going on
2
17
86
IDA Reverse Engineering Step-by-Step Into Reverse Engineering: EXE Patreon Unlocked ❤️
6
196
1K
BLE chip leaks AES keys through RF signals: a successful remote side-channel attack. 🔵🦷၊၊||၊|👂🔑 More details on: LinkedIn: https://t.co/U5eQaM63BE Substack: https://t.co/H6SL7rYKf9
5
94
556
EDR Analysis: Leveraging Fake DLLs, Guard Pages, and VEH for Enhanced Detection https://t.co/ZzjOqqeNhf
2
58
267