x86matthew Profile Banner
x86matthew Profile
x86matthew

@x86matthew

Followers
21K
Following
355
Media
38
Statuses
94

C / asm / system emulation / reverse engineering. @the_secret_club

UK
Joined June 2020
Don't wanna be here? Send us removal request.
@x86matthew
x86matthew
5 months
Another pointless weekend project - a playable version of the old 3DMaze screensaver from Windows 9x. I reverse-engineered the original screensaver binary and added user-input functionality for the controls (and fixed some other minor issues!).
52
229
2K
@x86matthew
x86matthew
5 months
Just released another project that I created a few weeks ago - a NES emulator for Windows written in C/C++ using pure WinAPI 🎮.
28
156
818
@x86matthew
x86matthew
5 months
Short demo of ping.exe running within a virtualized environment using this emulator:
2
2
80
@x86matthew
x86matthew
5 months
I created a hypervisor-based emulator for Windows x64 binaries. This project uses Windows Hypervisor Platform to build a virtualized user-mode environment, allowing syscalls and memory accesses to be logged or intercepted. Project:.
30
355
1K
@x86matthew
x86matthew
8 months
last day at @MDSecLabs today 😢 but looking forward to some new challenges at @elastic next week!.
19
5
231
@x86matthew
x86matthew
9 months
happy to finish in the top 10 this year (only just!) #flareon11
Tweet media one
10
11
294
@x86matthew
x86matthew
1 year
here it is running a small DOS-based game from Flare-On 2023 (challenge 6, FlareSay.exe) 🙂
0
2
29
@x86matthew
x86matthew
1 year
DOSVisor - A hypervisor-level emulator for executing 16-bit real-mode DOS programs on Windows.
3
104
355
@x86matthew
x86matthew
1 year
WoWMIPS - A MIPS R4000 emulator which allows legacy Windows NT MIPS binaries to run on modern x86/64 Windows. A short series of articles describes the development of this emulator:.
Tweet media one
9
106
363
@x86matthew
x86matthew
2 years
12 months late but it has finally arrived 🙂 #flareon9
Tweet media one
0
1
115
@x86matthew
x86matthew
2 years
finished for another year! #flareon10
Tweet media one
4
7
132
@x86matthew
x86matthew
2 years
First blog post in a while! This article describes an undocumented trick to embed executable code within (what appears to be) a read-only PE section.
Tweet media one
16
326
1K
@x86matthew
x86matthew
2 years
it has been a few years since i last wrote a game cheat. modern games don't interest me so i've gone the other way and written an aimbot for the original doom - works on windows 95 with the official binaries 🙂
12
25
223
@x86matthew
x86matthew
2 years
16-bit solitaire is now running as it should 🙂 now i'm definitely finished with the project because i can't handle any more nights debugging minor cpu logic bugs until 5am 😥
11
15
216
@x86matthew
x86matthew
2 years
following on from my post last week, 16-bit minesweeper now runs flawlessly in my windows 3.1 cpu/win16api emulator 🙂 i don't plan to take it any further from here but will consider writing a post covering the fun (and not so fun) bits if there is any interest in this project 🙂
10
29
177
@x86matthew
x86matthew
2 years
i have been writing a windows 3.1 emulator in my spare time over the last few weeks, it emulates an 80286 cpu running in protected mode and forwards/translates win16 api calls to the native api at runtime. my first test program is working correctly - minesweeper is coming next 🙂
Tweet media one
22
82
792
@x86matthew
x86matthew
2 years
SelfDebug - A useless anti-debug trick by (sort of) forcing a process to debug itself.
Tweet media one
5
56
223
@x86matthew
x86matthew
3 years
StealthHook - A method for hooking functions without modifying memory protection. This tool automatically discovers writable global pointers/vtable entries that are nested within the target function, enabling stealthy function hooking and interception.
Tweet media one
7
257
758
@x86matthew
x86matthew
3 years
reading #flareon9 writeups from other people has been interesting - it highlights how everybody (including myself) used very different methods and thought processes to solve the challenges 🙂.
1
5
45
@x86matthew
x86matthew
3 years
SharedMemUtils - A simple tool to automatically find vulnerabilities in shared memory objects (commonly used for IPC in Windows services). This tool immediately uncovered potential exploitation routes in both Nvidia and Dell Audio services on my system.
Tweet media one
9
254
797