Kunal Mehta Profile
Kunal Mehta

@kmgkv1

Followers
238
Following
2K
Media
0
Statuses
312

System software and security engineer working @Intel, passionate for cyber security and platform security. Views expressed are my own, not my employer’s.

Oregon, USA
Joined September 2018
Don't wanna be here? Send us removal request.
@kmgkv1
Kunal Mehta
4 months
RT @standa_t: Nice to see Intel and MSFT's posts on VT-rp / HVPT. If you are interested in playing with the feature, simple example code….
Tweet card summary image
github.com
A simple hypervisor demonstrating the use of the Intel VT-rp (redirect protection) technology. - tandasat/Hello-VT-rp
0
11
0
@kmgkv1
Kunal Mehta
4 months
RT @gynvael: Paged Out! #6 is out!.Totally free, 80 pages, best issue so far!.'nuff said, enjoy!. (please RT to hel….
0
106
0
@kmgkv1
Kunal Mehta
6 months
RT @x86matthew: I created a hypervisor-based emulator for Windows x64 binaries. This project uses Windows Hypervisor Platform to build a vi….
Tweet card summary image
github.com
WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API - x86matthew/WinVisor
0
355
0
@kmgkv1
Kunal Mehta
9 months
RT @SpecterDev: I've published the repo for Byepervisor (we love named vulns out here). Contains exploit implementation for two PS5 hypervi….
Tweet card summary image
github.com
A PS5 hypervisor exploit for 1.xx-2xx firmwares. Contribute to PS5Dev/Byepervisor development by creating an account on GitHub.
0
125
0
@kmgkv1
Kunal Mehta
10 months
RT @evilsocket: Heap exploitation, glibc internals and nifty tricks.
0
38
0
@kmgkv1
Kunal Mehta
10 months
RT @dwizzzleMSFT: Reducing the attack surface in the Azure hypervisor with a Rust VMM and hardware offload:
Tweet card summary image
techcommunity.microsoft.com
Azure virtualization model with Boost, and OpenHCL 
0
17
0
@kmgkv1
Kunal Mehta
1 year
RT @xvonfers: V8 Sandbox escape/bypass/violation and VR collection.
Tweet card summary image
github.com
Contribute to xv0nfers/V8-sbx-bypass-collection development by creating an account on GitHub.
0
86
0
@kmgkv1
Kunal Mehta
1 year
RT @standa_t: 24H2 enables HVPT (VT-rp / HLAT) to prevent remapping attacks. You can check if it is enabled with msinfo32, systeminfo, or….
0
25
0
@kmgkv1
Kunal Mehta
1 year
RT @aall86: NT meet FRED :-).
0
3
0
@kmgkv1
Kunal Mehta
1 year
RT @dwizzzleMSFT: I'm excited about the progress on Virtualization-based Security being ported from Windows to Linux:. .
0
42
0
@kmgkv1
Kunal Mehta
2 years
RT @standa_t: Write up of the HVCI bypass vuln (CVE-2024-21305) with @aall86 !.
Tweet media one
0
115
0
@kmgkv1
Kunal Mehta
2 years
RT @witeken: Intel Labs Contributes Key Technologies to New Intel Core Ultra and Intel Xeon Scalable Processors. -Datapath and Register Fil….
Tweet card summary image
community.intel.com
Scott Bair is a key voice at Intel Labs, sharing insights into innovative research for inventing tomorrow’s technology. Highlights Intel Labs contributed new technologies to Intel’s newly introduced...
0
6
0
@kmgkv1
Kunal Mehta
2 years
RT @standa_t: "Bypassing the HVCI memory protection" at #HEXACON2023 discusses remapping attack with an application to code pages. If you w….
0
22
0
@kmgkv1
Kunal Mehta
2 years
RT @Adam_pi3: Linux kernel merged the x86 shadow stack support, part of Intel's Control-flow Enforcement Technology (CET):. .
0
12
0
@kmgkv1
Kunal Mehta
2 years
RT @aall86: . Glad to see that my tool is used by PRO like @dwizzzleMSFT . and glad to see that we can introduce HVPT publicly finally :….
0
1
0
@kmgkv1
Kunal Mehta
2 years
RT @dwizzzleMSFT: ayyyyyyyyyy HLAT PTE protection is ALIVE @FuzzySec
Tweet media one
0
8
0
@kmgkv1
Kunal Mehta
2 years
RT @mmolgtm: In this post I'll use CVE-2023-3420, an incorrect side effect modelling bug in the JIT compiler that I reported to Chrome, to….
Tweet card summary image
github.blog
In this post, I'll exploit CVE-2023-3420, a type confusion in Chrome that allows remote code execution (RCE) in the renderer sandbox of Chrome by a single visit to a malicious site.
0
109
0