Jesse Michael
@jessemichael
Followers
1K
Following
274K
Media
68
Statuses
2K
Squeee so excited ššš @Blackhoodie_RE will be at @DistrictCon next year, on January 23rd @SynapticRewrite and I will teach a day of Reverse Engineering for Vulnerability Discovery, registration is now open
blackhoodie.re
Why, hello! BlackHoodie is super excited to be partnering with DistrictCon in 2026, bringing a day of vulnerability hunting in binaries toWashington DC! Come join us for an exciting day of reverse...
0
10
27
here's a small project i put together recently - a custom "bare-metal" protected-mode x86 NES emulator. it fits into 1MB RAM and loads ROMs from a floppy disk, no OS required. if you want to turn your old PC into an awkward NES clone with bad sound emulation then look no further.
3
35
223
Watch XORās talk CUDA de GrĆ¢ce: Owning AI Cloud Infrastructure with GPU exploits Kernel + driver bugs arenāt just a LPE problem, theyāre a cloud problem. With the explosion of AI in the cloud, NVIDIAās GPU drivers have become a valuable attack surface https://t.co/cIYKcYMb6L
5
70
251
A ton of great info here about what Apple does for their secure boot chain: āA Reverse Engineerās Anatomy of the macOS Boot Chain & Security Architectureā
stack.int.mov
1.0 The Silicon Root of Trust: Pre-Boot & Hardware Primitives The security of the macOS platform on Apple Silicon is not defined by the kernel; it is defined by the physics of the die. Before the...
1
30
103
If you feel like you're bad at your job and it's making you depressed, just consider that, as the investigation of the recent heist revealed, the password to access the Louvre's videosurveillance system was "Louvre".
681
14K
163K
kernel hackers go serverless ring0 ā cloud 9 āļø ?? brb pwning yr gpu nodes āØ
25
121
621
#ESETresearch has discovered #HybridPetya ransomware on VirusTotal: a UEFI-compatible copycat of the infamous Petya/NotPetya malware. HybridPetya is capable of bypassing UEFI Secure Boot on outdated systems. @smolar_m
https://t.co/UQAcC4O3Pu 1/8
welivesecurity.com
ESET Research has discovered HybridPetya, a copycat of the infamous Petya/NotPetya malware that adds the capability of compromising UEFI-based systems and weaponizing CVEā2024ā7344 to bypass UEFI...
2
68
147
consumer devices really don't stand a chance against motivated nerds.
Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras https://t.co/jUb9a1NTpd Credits @Watchful_IP
#embedded #infosec
3
6
28
Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras https://t.co/jUb9a1NTpd Credits @Watchful_IP
#embedded #infosec
4
85
371
I did a writeup on exploiting the ASIO64.sys driver that was fuzzed from @vxunderground's vulnerable driver project. Nothing novel or complex, but I had fun writing the exploit: https://t.co/Wi8TinrGBx
2
54
172
I've been asked countless times how to learn VR & xdev. The answer is always: "do something you think is cool". It's hard to figure out what to do. Try the PhrackCTF which I've now open-sourced. It's not a contrived CTF - modeled after real vulnerabilities
github.com
Binary Exploitation Phrack CTF Challenge. Contribute to xforcered/PhrackCTF development by creating an account on GitHub.
10
148
621
At long last - Phrack 72 has been released online for your reading pleasure! Check it out: https://t.co/R0PKIifRDA
7
324
757
The Phrack Binary Exploitation CTF hasnāt been solved yet!! 2 challenges unlock #Phrack72 to the public. 1 Linux challenge and 1 Windows kernel challenge ā based on my favorite real life bugs. Win an exclusive Phrack coin and get your write up on the website!
At @defcon! I'm looking for someone with the #WHY2025 edition of @phrack to trade QR halves for the #Phrack72 CTF. Drop me a DM if interested!. @netspooky @chompie1337 @richinseattle
5
28
156
Hereās a video of an exploited Lenovo 510 FHD Webcam downloading a meterpreter payload from the internet and executing it, letting us send keystrokes to the computer itās connected to, then return to being a regular unsuspecting webcam š (Top left: webcam serial port output
2
6
18
Going to @defcon?! We'll have 9500 print copies of Phrack, and Sunday @ noon @netspooky @richinseattle and @chompie will be on main stage! https://t.co/CnATXAp5ri
13
90
328
@jessemichael and I got accepted to speak at @defcon and i hope that we can make our talk as entertaining as it should beš https://t.co/kMoH3QWjBQ
0
5
9
SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O https://t.co/5u6D8J5wc5
#uefi #infosec
1
52
241
The Journey of Bypassing Ubuntuās Unprivileged Namespace Restriction Article by @u1f383 about the internals of the Ubuntu's implementation of restricting unprivileged user namespaces and figuring out another bypass method. https://t.co/c2NAJ2RddZ
0
16
88