
ö
@r0keb
Followers
686
Following
1K
Media
0
Statuses
77
Good Morning! Just published a blog post analyzing Hyper-V functionality, design, and key binaries, hvix64.exe (hypervisor), securekernel.exe (secure kernel), and winload.dll (boot-time loader and CPU check).
r0keb.github.io
Good morning! In today’s blog I’m going to introduce one of my favorite topics in all of computer science, programming, and low-level computing, hypervisors. In this case, the Windows hypervisor,...
4
64
218
Good Morning! Just published a blog post diving into Windows Kernel LFH exploitation in the latest Windows 24h2 build, Focusing on controlled allocations to achieve arbitrary read/write in the kernel.
r0keb.github.io
Good morning! In today’s blog post, we’re going one step further than in the previous post Windows Kernel Pool Internals (which I recommend reading to understand some of the concepts discussed here),...
4
79
309
Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, internal structures, and how Segment Heap, LFH, and VS work.
r0keb.github.io
Good morning! In today’s blog post we’re going to dive into a topic that has interested me for quite some time, the Windows kernel pool. It’s a topic that tends to have “scarce” documentation online...
4
135
402
Just published a blog post exploring junk code engines used in polymorphic malware. Part one covers ETG by Z0MBiE (32-bit). Part two introduces TrashFormer, my 64-bit implementation. Both fully written in assembly.
r0keb.github.io
Good morning! Today we’re going to take a very detailed look at how a junk code generator called ETG (Executable Trash Generator) works. It was created by Z0MBiE (29a) and is designed for 32-bit...
0
43
125
Good morning! Just published a deep dive into PatchGuard internals: how it works, key internal functions, context init, and possible bypasses.
r0keb.github.io
Good morning! In today’s blog we’re going to talk about one of the most powerful protections for Windows: PatchGuard, also known as KPP (Kernel Patch Protection).
4
106
313
Good morning! I just published a blog post about a KASLR bypass that works on modern Windows 11 versions. It leverages Intel CPU cache timings to exfiltrate the base address of ntoskrnl.exe. I hope you like it!.
r0keb.github.io
Good morning! As we saw in last week’s blog post, the use of NtQuerySystemInformation() to bypass kASLR and the changes introduced in version 24H2 have effectively taken away that convenient method...
11
131
415
RT @ProteasWang: `CVE-2025-24203`: hierarchy of vm_object_t when changing `MAP_SHARED` to `MAP_PRIVATE`. The topmost object has its own phy….
0
16
0
Just dropped a blog post on NtQuerySystemInformation changes that killed an old kASLR bypass. Added some internals research too, pre & post 24H2. Check it out!.
r0keb.github.io
Good morning! Today’s blog won’t be too long, but that doesn’t mean it’s not important.
1
29
90
New blog post out! I cover two SMEP bypass techniques in the Windows Kernel: one using a Write-What-Where to flip the U/S bit in the PTE, and another via type confusion with ROP and stack pivoting. Check it out!.
r0keb.github.io
Good morning, in this blog post we’re going to take a deep dive into the SMEP mitigation or Supervisor Mode Execution Prevention. This is a security feature present in modern Intel processors...
0
22
54
I've just published a new blog post where I explain various Shellcoding techniques in the Windows Kernel. There's also a GitHub repo with the code used. Hope you enjoy it!.
r0keb.github.io
Let’s kick off the blog with the foundation and starting point of all our exploits: the code we want to inject — the shellcode.
0
2
3
RT @slowerzs: Think HVCI and kCET mean the end of kernel code execution? I wrote a blogpost exploring an alternative way to execute a kerne….
blog.slowerzs.net
0
118
0
RT @2ourc3: Write-up of my v8 bug: Critical type confusion in V8's Turboshaft compiler allowed stale pointers to bypass GC, leading to expl….
bushido-sec.com
V8 Turboshaft Load Elimination Type Confusion Vulnerability (CVE-2024-6773)Exploitable Memory Corruption via Garbage Collection Race Condition Executive Summary A critical type confusion vulnerabil...
0
64
0
RT @cffsmith: I’m very excited to announce that we at V8 Security have finally published our first version of Fuzzilli that understands Was….
github.com
A JavaScript Engine Fuzzer. Contribute to googleprojectzero/fuzzilli development by creating an account on GitHub.
0
107
0
RT @33y0re: Today I’m sharing a blog post on the implementation of kernel mode shadow stacks on Windows! This post covers actively debuggin….
connormcgarr.github.io
Using SourcePoint’s JTAG debugger to investigate the implementation of Intel CET Shadow Stacks in kernel-mode on Windows
0
154
0
RT @DebugPrivilege: For the hardcore reverse engineers and malware analysts out there, my ex-colleague just dropped a deep dive into 'Scatt….
cloud.google.com
We been tracking multiple espionage operations conducted by China-nexus actors utilizing POISONPLUG.SHADOW malware.
0
77
0
RT @x86matthew: I created a hypervisor-based emulator for Windows x64 binaries. This project uses Windows Hypervisor Platform to build a vi….
github.com
WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API - x86matthew/WinVisor
0
353
0