
Takahiro Haruyama
@cci_forensics
Followers
3K
Following
872
Media
152
Statuses
5K
Due to some missing links on the conference web pages, I uploaded my conference talk pdfs for 10 years. Time flies.
1
30
106
RT @thatjiaozi: As promised Blogpost is here! . I find that a lot of the times people ask “how can researchers find complex bugs”. This is….
bughunters.google.com
This blog post describes the journey of discovering a VM escape bug with the goal of demystifying the security research process and demonstrating how persistence and pivoting can lead to achieving...
0
86
0
RT @binarly_io: 🚨More than a year after the XZ Utils crisis, we found 35+ publicly available Docker Hub images still carrying the backdoor,….
0
13
0
RT @gmhzxy: hyper-reV: A powerful memory introspection & reverse engineering hypervisor leveraging Hyper-V. Read/write guest memory, SLAT h….
github.com
memory introspection and reverse engineering hypervisor powered by leveraging Hyper-V - noahware/hyper-reV
0
51
0
RT @Idov31: I'm happy to finally release NovaHypervisor! NovaHypervisor is a defensive hypervisor with the goal of protecting AV/EDR vendor….
github.com
NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (either via Bring Your Own Vulnerable Driver (BYOVD) or other mean...
0
88
0
RT @binarly_io: 🐳 𝗣𝘀𝘀𝘁, 𝘆𝗼𝘂𝗿 𝗰𝗼𝗻𝘁𝗮𝗶𝗻𝗲𝗿 𝗶𝘀 𝗹𝗲𝗮𝗸𝗶𝗻𝗴 𝘀𝗲𝗰𝗿𝗲𝘁𝘀 𝗴𝗮𝗹𝗼𝗿𝗲.The Binarly REsearch examine more than 𝟴𝟬,𝟬𝟬𝟬 popular Docker Hub images (𝟭….
0
6
0
RT @binarly_io: Nvidia OSR (@AlexTereshkin, @Adam_pi3) reveals high-impact Supermicro BMC vulnerabilities (CVE-2024-10237/38/39). Binarly R….
0
21
0
RT @binarly_io: 🔎From Hidden Semantics to Structured Insights✨. By combining static analysis techniques and tailored heuristic improvements….
0
14
0
RT @InfPCTechStack: Our talk at #BHUSA @BlackHatEvents Briefings has been accepted!. This is a presentation on an initiative to make the BI….
0
11
0
RT @NikolajSchlej: The embargo (12:00 UTC 2025-06-10) is over, let's start a thread on Hydroph0bia (CVE-2025-4275), a trivial SecureBoot an….
coderush.me
0
93
0
RT @pagabuc: Our research on Secure Boot keeps on giving!. Today we disclose CVE-2025-3052, a Secure Boot bypass that started with vulnerab….
0
10
0
RT @binarly_io: 🚨Binarly is documenting the discovery of CVE-2025-3052, a memory-corruption flaw in a Microsoft-signed UEFI module that let….
0
69
0
My former colleague @DanaBehling is seeking new opportunities. She has deep expertise in malware and threat research and is dedicated to supporting her teammates. Highly recommended—feel free to reach out to me. Conference Talk: Her blog:.
0
4
11
RT @binarly_io: Binarly REsearch is proud to build & support two @HexRaysSA IDA plugin contest winners:. 🔬 efiXplorer by @yeggorv . https://….
0
12
0
RT @HexRaysSA: 👋 Please join us in welcoming @RolfRolles as Hex-Rays’ new Chief Scientist!. Rolf brings decades of RE expertise, with stand….
0
23
0
RT @binarly_io: Why do attackers love bootkits? 🔗Persistence + ♻️stealth. At the @REverseConf, Binarly REsearcher @cci_forensics shows how….
0
11
0
RT @xorpse: We're are happy to announce a new release of our #Rust bindings for @HexRaysSA idalib. What's new:.- New APIs for working with….
github.com
Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib - binarly-io/idalib
0
21
0