
Unhandled0xD
@trap_handler
Followers
5K
Following
12K
Media
500
Statuses
4K
Vulnerability Researcher - wannabe master of #Pwn2Own one day 🦦 - I study the language of the universe, humans and systems
Joined July 2022
RT @eversinc33: As a little follow up, I wrote a small blog post/tutorial on how to reverse engineer windows drivers with IDA - this is aim….
0
127
0
RT @GoogleVRP: Our latest post details how we exploited Retbleed (a CPU vulnerability) to compromise a machine from a sandboxed process and….
bughunters.google.com
Curious to hear about our experience exploiting Retbleed (a security vulnerability affecting modern CPUs)? Then check out this post to see how we pushed the boundaries of Retbleed exploitation and...
0
52
0
RT @zerodaytraining: New class: Hypervisor Field Updates 2021-2025. In this series of four lectures @alisaesage looks into recent virtualiz….
0
2
0
RT @lauriewired: Ring 0 is a highly-privileged state on CPUs. Negative Ring Levels have even *higher* privilege. You just haven’t heard of….
0
483
0
10+ hours of trying to write lsass parser end with fail :)
Im feeling now the hard work @gentilkiwi put into 🥝mimikatz, parsing the lsass and trying to extract the credentials is research not just a technique or API you call its not easy tbh “at least for me”.
0
0
8
RT @alisaesage: Finalizing a series of lectures updating my Hypervisor Vulnerability Research course on the period 2021-2025. MASSIVE new d….
0
16
0
RT @Mandiant: The 12th Annual Flare-On Challenge kicks off Sept 26 at 8PM EST!. Reverse engineering pros, from Windows to Web3 (with a YARA….
0
76
0
RT @AlanSguigna: Here are the links to the recordings of my prior two webinars:.Debug of Hyper-V, Secure Kernel, VBS Enclaves, Defender, an….
0
17
0
RT @0x_shaq: when I find a new attack surface but I need to convince my employer to give me time for research even though I have zero evide….
0
24
0
RT @xvonfers: vr/xd is very easy and simple, and doesn't strain your nerves. Meanwhile, an ordinary vr/xd who is 21 years old. https://….
0
2
0
RT @zerodaytraining: New research blog: “From a Binary Patch to a Proof-of-concept: a VMware ESXi vmxnet3 Case Study”, by @alisaesage https….
0
70
0
RT @C5pider: Introducing Havoc Professional: A Lethal Presence. We’re excited to share a first look at Havoc Professional, a next-generatio….
infinitycurve.org
An introduction to Havoc Professional and Kaine-kit, exploring the advanced features and capabilities that make them lucrative for modern security professionals.
0
184
0