@p0p0pr3t Profile picture

POPOPRET

@p0p0pr3t

Mind reader, Security Architect, Like breaking stuff to build better stuff.

Similar User
loveshell photo

@1xi

Ron BY photo

@RonB_Y

Sin__ photo

@mztropics

Nikhil Hegde photo

@ka1do9

Not sure there's a PoC yet for CVE-2024-43451, but here's my version: Attacker sends a minimal .url file pointing to their server. Victim interacts with it, Windows downloads the malicious file. Payload runs, system gets compromised. .url file deletes itself, leaving no trace.


POPOPRET Reposted

🚀 DakshSCRA Update! 🚀 Due to popular demand, C and C++ scanning is here earlier than planned! 🎯 ✅ C rules are tested and ready to go. ⚠️ C++ rules are still under review—expect updates soon. More rules will follow as I fine-tune things. github.com/coffeeandsecur…


POPOPRET Reposted

Crowdstrike Analysis: It was a NULL pointer from the memory unsafe C++ language. Since I am a professional C++ programmer, let me decode this stack trace dump for you.

Tweet Image 1

Windows Kernel Driver Utility - The purpose of this tool is to give a simple way to explore Windows kernel/components without doing a lot of additional work or setting up local debugger. github.com/hfiref0x/KDU


POPOPRET Reposted

Introducing the official release of Daksh SCRA (Source Code Review Assist) post #BlackHatUSA2023. After its exclusive demo at Blackhat 2023, it's time to take your code reviews to the next level. Check out the GitHub repository github.com/coffeeandsecur… #DakshSCRA #SourceCodeReview


POPOPRET Reposted

Dropping #Downfall, exploiting speculative forwarding of 'Gather' instruction to steal data from hardware registers. #MeltdownSequel - Practical to exploit (POC/Demo) - Defeat all isolation boundaries (OS, VM, SGX) - Bypass all Meltdown/MDS mitigations. downfall.page


POPOPRET Reposted
Tweet Image 1

Attacking Firecracker: AWS' microVM Monitor Written in Rust graplsecurity.com/post/attacking…


United States Trends
Loading...

Something went wrong.


Something went wrong.