Similar User
@x86matthew
@re_and_more
@offensive_con
@yarden_shafir
@zodiacon
@AmarSaar
@NinjaParanoid
@ret2systems
@matterpreter
@ShitSecure
@VirtualAllocEx
@tiraniddo
@maxpl0it
@an0n_r0
@5aelo
Recently I was writing up a blog about Secure Kernel and NT working together to initialize Kernel CFG. I realized there were a lot of concepts in SK I was unfamiliar with. Because of this I wrote a post on one of those topics - Secure Image Objects. Enjoy! connormcgarr.github.io/secure-images/
A big thank you to the awesome @AlanSguigna for kindly and patiently giving me an overview of the powerful SourcePoint Debugger! I now have a really cool Secure Kernel debugging environment and I look forward to what the weekend holds 😊
I am very happy to have presented my talk "Redefining Security Boundaries: Unveiling Hypervisor-Backed Security Features For Windows Security" at SANS HackFest 2024! The slides can be found here for anyone who is interested: (github.com/connormcgarr/P…)
.@33y0re is here discussing how hypervisor-backed security features are changing the game in Windows security by blocking modern Bring Your Own Vulnerable Driver (BYOVD) attacks. 🚀 Register Free Online & Join Us: sans.org/u/1vBt #SANSHackFest
Debugging the Windows Hypervisor and dissecting Secure Kernel calls – my latest blog post takes you through the process, step-by-step. dor00tkit.github.io/Dor00tkit/post… #Hyperv #ReverseEngineering
techcommunity.microsoft.com/t5/windows-os-… VTL 2, finally publicly announced!
Proud of the team for getting this new mitigation to address CLFS issues to Insiders this month. Bypasses for this feature are in-scope for Windows Bounty, so please tell us what we've missed!
Security mitigation for the Common Log Filesystem (CLFS) techcommunity.microsoft.com/t5/security-co…
After 5 years, today is my last day at CrowdStrike. It’s been so fulfilling to ship so many awesome features to customers and to learn what low-level development is about! I am happy to say I will be joining @preludeorg & I look forward to working on some really cool projects 😀
Join us at #SANSHackFest when @33y0re will discuss how hypervisor-backed security features are redefining Windows security & blocking modern Bring Your Own Vulnerable Driver (BYOVD) attacks. View Agenda & Register: sans.org/u/1vBt
Join me in Los Angeles this October! Now that DEFCON is over I'm focusing my energy on Hackfest Hollywood on October 28th and 29th! I'm looking forward to connecting with so many folks who I missed in Las Vegas. ...and it's Halloween Horror Nights at Universal Studios, where the…
Wanted to share a technical blog post that I coauthored on some of the architectural decisions that I helped drive during my time as Chief Architect @CrowdStrike all those years ago. Thank you to the team and @dwizzzleMSFT for the partnership. crowdstrike.com/blog/tech-anal…
📣 The #SANSHackFest Agenda is LIVE & packed w/ highly technical talks from @dwizzzleMSFT @yarden_shafir @buffaloverflow & David Cash @33y0re & more! Join us in Hollywood for exclusive access to ALL talks, workshops, & challenges. ➡️ Agenda: sans.org/u/1vBt #PenTest
I'm happy to share that I'll be giving a workshop at @44CON about WinDbg, where I'll introduce a tool I've developed to make debugging much easier. Time to tame the Windows debugger together! 44con.com/44con-2024-tal…
I’m thrilled to share my latest blog post! This one focuses on the bug hunting process: inspiration, approach, and execution. I also provide a retrospective on how the bug was introduced and analyze the insufficient “patch”. Check it out: securityintelligence.com/x-force/little…
Following in @33y0re's footsteps by reviewing his excellent article, Windows Internals: Dissecting Secure Image Objects - Part 1 (connormcgarr.github.io/secure-images/) in my latest Hyper-V blog: asset-intertech.com/resources/blog….
Conditional breakpoint for monitoring Secure System Calls: ba e1 /w "@$curregisters.User.rdx == SECURE_SYSTEM_CALL_NUMBER" nt!VslpEnterIumSecureMode Useful for dynamic parameter inspection since the calls aren't really all that documented!
Thanks to everyone who attended my talk! @offensive_con was an incredible experience. Couldn't make it? Don't worry- here are my slides! Recommend them to anyone wanting to learn more about Secure Boot's third-party risks. nbviewer.org/github/microso…
Ecstatic to share that my talk was accepted to Offensive Con. Excited to have an excuse to visit the city I was born in. Hope to see you there!
United States Trends
- 1. McDonald 44,1 B posts
- 2. #AskFFT N/A
- 3. Good Sunday 62,7 B posts
- 4. Mike Johnson 50,3 B posts
- 5. #AskZB N/A
- 6. #sundayvibes 7.272 posts
- 7. #ATEEZ_1stDAESANG 10,9 B posts
- 8. Jon Jones 264 B posts
- 9. #UFC309 346 B posts
- 10. CONGRATULATIONS ATEEZ 20,1 B posts
- 11. Blessed Sunday 19,2 B posts
- 12. Coke 31,9 B posts
- 13. Alec Baldwin 11,2 B posts
- 14. Founders Day N/A
- 15. Yosohn 1.062 posts
- 16. MY ATEEZ 70,9 B posts
- 17. Happy Founders N/A
- 18. Jussie 4.259 posts
- 19. Stipe 123 B posts
- 20. Froot Loops N/A
Who to follow
-
x86matthew
@x86matthew -
Reverse Engineering and More
@re_and_more -
offensivecon
@offensive_con -
Yarden Shafir
@yarden_shafir -
Pavel Yosifovich
@zodiacon -
Saar Amar
@AmarSaar -
Chetan Nayak (Brute Ratel C4 Author)
@NinjaParanoid -
RET2 Systems
@ret2systems -
Matt Hand
@matterpreter -
S3cur3Th1sSh1t
@ShitSecure -
Daniel F.
@VirtualAllocEx -
James Forshaw
@tiraniddo -
maxpl0it
@maxpl0it -
an0n
@an0n_r0 -
Samuel Groß
@5aelo
Something went wrong.
Something went wrong.