r0keb Profile Banner
ö Profile
ö

@r0keb

Followers
686
Following
1K
Media
0
Statuses
77

low level enthusiast

Joined May 2023
Don't wanna be here? Send us removal request.
@r0keb
ö
1 day
Good Morning! Just published a blog post analyzing Hyper-V functionality, design, and key binaries, hvix64.exe (hypervisor), securekernel.exe (secure kernel), and winload.dll (boot-time loader and CPU check).
r0keb.github.io
Good morning! In today’s blog I’m going to introduce one of my favorite topics in all of computer science, programming, and low-level computing, hypervisors. In this case, the Windows hypervisor,...
4
64
218
@r0keb
ö
15 days
Good Morning! Just published a blog post diving into Windows Kernel LFH exploitation in the latest Windows 24h2 build, Focusing on controlled allocations to achieve arbitrary read/write in the kernel.
r0keb.github.io
Good morning! In today’s blog post, we’re going one step further than in the previous post Windows Kernel Pool Internals (which I recommend reading to understand some of the concepts discussed here),...
4
79
309
@grok
Grok
1 day
Generate videos in just a few seconds. Try Grok Imagine, free for a limited time.
503
622
4K
@r0keb
ö
1 month
Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, internal structures, and how Segment Heap, LFH, and VS work.
r0keb.github.io
Good morning! In today’s blog post we’re going to dive into a topic that has interested me for quite some time, the Windows kernel pool. It’s a topic that tends to have “scarce” documentation online...
4
135
402
@r0keb
ö
2 months
Just published a blog post exploring junk code engines used in polymorphic malware. Part one covers ETG by Z0MBiE (32-bit). Part two introduces TrashFormer, my 64-bit implementation. Both fully written in assembly.
r0keb.github.io
Good morning! Today we’re going to take a very detailed look at how a junk code generator called ETG (Executable Trash Generator) works. It was created by Z0MBiE (29a) and is designed for 32-bit...
0
43
125
@r0keb
ö
2 months
Good morning! Just published a deep dive into PatchGuard internals: how it works, key internal functions, context init, and possible bypasses.
r0keb.github.io
Good morning! In today’s blog we’re going to talk about one of the most powerful protections for Windows: PatchGuard, also known as KPP (Kernel Patch Protection).
4
106
313
@r0keb
ö
3 months
Good morning! I just published a blog post about a KASLR bypass that works on modern Windows 11 versions. It leverages Intel CPU cache timings to exfiltrate the base address of ntoskrnl.exe. I hope you like it!.
r0keb.github.io
Good morning! As we saw in last week’s blog post, the use of NtQuerySystemInformation() to bypass kASLR and the changes introduced in version 24H2 have effectively taken away that convenient method...
11
131
415
@r0keb
ö
3 months
RT @ProteasWang: `CVE-2025-24203`: hierarchy of vm_object_t when changing `MAP_SHARED` to `MAP_PRIVATE`. The topmost object has its own phy….
0
16
0
@r0keb
ö
3 months
RT @horsicq: obfus.h is the powerfull compile-time obfuscator for C (win32/64). Supports virtualization, anti-debugging, control flow obfus….
0
79
0
@r0keb
ö
3 months
Just dropped a blog post on NtQuerySystemInformation changes that killed an old kASLR bypass. Added some internals research too, pre & post 24H2. Check it out!.
r0keb.github.io
Good morning! Today’s blog won’t be too long, but that doesn’t mean it’s not important.
1
29
90
@r0keb
ö
3 months
RT @daaximus: Unlock forbidden Windows knowledge! 🤫💻.Find the PEB through truly undetected means and pop calculator 💥.The non-golf form wil….
0
34
0
@r0keb
ö
4 months
New blog post out! I cover two SMEP bypass techniques in the Windows Kernel: one using a Write-What-Where to flip the U/S bit in the PTE, and another via type confusion with ROP and stack pivoting. Check it out!.
r0keb.github.io
Good morning, in this blog post we’re going to take a deep dive into the SMEP mitigation or Supervisor Mode Execution Prevention. This is a security feature present in modern Intel processors...
0
22
54
@r0keb
ö
4 months
I've just published a new blog post where I explain various Shellcoding techniques in the Windows Kernel. There's also a GitHub repo with the code used. Hope you enjoy it!.
r0keb.github.io
Let’s kick off the blog with the foundation and starting point of all our exploits: the code we want to inject — the shellcode.
0
2
3
@r0keb
ö
4 months
RT @slowerzs: Think HVCI and kCET mean the end of kernel code execution? I wrote a blogpost exploring an alternative way to execute a kerne….
Tweet card summary image
blog.slowerzs.net
0
118
0
@r0keb
ö
5 months
RT @2ourc3: Write-up of my v8 bug: Critical type confusion in V8's Turboshaft compiler allowed stale pointers to bypass GC, leading to expl….
Tweet card summary image
bushido-sec.com
V8 Turboshaft Load Elimination Type Confusion Vulnerability (CVE-2024-6773)Exploitable Memory Corruption via Garbage Collection Race Condition Executive Summary A critical type confusion vulnerabil...
0
64
0
@r0keb
ö
5 months
RT @xvonfers:
0
3
0
@r0keb
ö
5 months
RT @xvonfers: Better domatolpm generation:.Add a notification_service domatolpm MojoJS fuzzer:..
0
2
0
@r0keb
ö
6 months
RT @cffsmith: I’m very excited to announce that we at V8 Security have finally published our first version of Fuzzilli that understands Was….
Tweet card summary image
github.com
A JavaScript Engine Fuzzer. Contribute to googleprojectzero/fuzzilli development by creating an account on GitHub.
0
107
0
@r0keb
ö
6 months
RT @33y0re: Today I’m sharing a blog post on the implementation of kernel mode shadow stacks on Windows! This post covers actively debuggin….
connormcgarr.github.io
Using SourcePoint’s JTAG debugger to investigate the implementation of Intel CET Shadow Stacks in kernel-mode on Windows
0
154
0
@r0keb
ö
7 months
RT @DebugPrivilege: For the hardcore reverse engineers and malware analysts out there, my ex-colleague just dropped a deep dive into 'Scatt….
Tweet card summary image
cloud.google.com
We been tracking multiple espionage operations conducted by China-nexus actors utilizing POISONPLUG.SHADOW malware.
0
77
0
@r0keb
ö
7 months
RT @x86matthew: I created a hypervisor-based emulator for Windows x64 binaries. This project uses Windows Hypervisor Platform to build a vi….
Tweet card summary image
github.com
WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API - x86matthew/WinVisor
0
353
0