Profile avatar
alexandreborges.bsky.social
Vulnerability Researcher | Exploit Developer (speaker 3x at DEF CON)
170 posts 433 followers 58 following
Prolific Poster

The Key to COMpromise - Pwning AVs and EDRs by Hijacking COM Interfaces, Part 1, 2 and 3: neodyme.io/en/blog/com_... neodyme.io/en/blog/com_... neodyme.io/en/blog/com_... #edr #redteam #informationsecurity #edr #com #programming #cybersecurity

The Art of Breaking AI: Exploitation of large language models: 7h3h4ckv157.medium.com/the-art-of-b... #ai #informationsecurity #infosec #llm #exploitation #exploit

The fourth article (126 pages) of the Exploiting Reversing Series (ERS) is available on: exploitreversing.com/2025/02/04/e... I hope you enjoy reading it and have an excellent day. #apple #ios #macOS #architecture #cybersecurity #research #internals #vulnerability #idapro

Free & Affordable Training News Monthly: Dec 2024 - Feb 2025 - Newly released DFIR, OSINT, and Malware Analysis training, tools, and books from Dec 2024 & Jan 2025 - Upcoming CTFs and training for February, 2025 Link: dfirdiva.com/free-amp-aff... #DFIR #IncidentResponse #MalwareAnalysis #OSINT

Mitigating DMA Attacks Through Redirected Address Tables research.meekolab.com/mitigating-d... #informationsecurity #cybersecurity #hardware #dma #processor

Reverse Engineering Call Of Duty Anti-Cheat: ssno.cc/posts/revers... #reverseengineering #anticheat #informationsecurity #cybersecurity #assembly

Securing Cryptocurrency Organizations: cloud.google.com/blog/topics/... #crypto #cybersecurity #informationsecurity #threatintelligence #cryptocurrency

The third article (62 pages) of the Exploiting Reversing Series (ERS) is available on: exploitreversing.com/2025/01/22/e... I hope you like the reading and have an excellent day #chrome #browsers #architecture #cybersecurity #v8 #research #internals #vulnerability #google

The third article (62 pages) of the Exploiting Reversing Series (ERS) is available on: exploitreversing.com/2025/01/22/e... I hope you like the reading and have an excellent day #chrome #browsers #architecture #cybersecurity #v8 #research #internals #vulnerability #google

2025.01.18: As expensive as a plane flight: Looking at some claims that quantum computers won't work. blog.cr.yp.to/20250118-fli... #quantum #energy #variables #errors #rsa #secrecy #crypto #informationsecurity #cybersecurity #cryptography

A Brief JavaScriptCore RCE Story: qriousec.github.io/post/jsc-uni... #cybersecurity #informationsecurity #rce #javascript #vulnerability

The tenth article (35 pages) of the Malware Analysis Series (MAS) is available on: exploitreversing.com/2025/01/15/m... Next week (JAN/22) the third article of the Exploiting Reversing Series (ER 03) will be released. Have an excellent day. #linux #malware #elf #crypto #ransomware

The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on: exploitreversing.com/2025/01/08/m... Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15). #malware

BlackPill is a stealthy Linux rootkit made in Rust. github.com/DualHorizon/... #rootkit #malware #linux #rust #hypervisor

Diving into ADB protocol internals: part 01: www.synacktiv.com/publications... part 02: www.synacktiv.com/en/publicati... #adb #mobile #protocol #informationsecurity #cybersecurity #reverseengineering

All videos from The 38th Chaos Communication Congress (38C3) 2024: media.ccc.de/b/congress/2... #cybersecurity #informationsecurity #hacking #exploitation #iOS #android #apple #exploitation #reverseengineering #vulnerability

Introduction to Algorithms (from MIT): (PDF) ocw.mit.edu/courses/6-00... (videos) ocw.mit.edu/courses/6-00... #algorithms #crypto #informationsecurity #cybersecurity

Uncovering GStreamer secrets: github.blog/security/vul... #informationsecurity #cybersecurity #vulnerability #bug #fuzzing

CVE-2024-40896 Analysis: libxml2 XXE due to type confusion www.openwall.com/lists/oss-se... #cve #linux #libxml2 #xxe #vulnerability #exploitation #bug #typeconfusion

Syscall tables | Combined Windows syscall tables github.com/hfiref0x/Sys... #lowlevel #reverseengineering #programming #cybersecurity

Rules to avoid common extended inline assembly mistakes: nullprogram.com/blog/2024/12... #programming #informationsecurity #cybersecurity

Good and interesting presentation by Joe Bialek: Pointer Problems – Why We’re Refactoring the Windows Kernel: youtube.com/watch?v=-3jx... #microsoft #windows #kernelsecurity #programming #kernel

Practical Use Cases of Exploiting MS Exchange in External Penetration Tests static.ptsecurity.com/events/exch-... #vulnerability #exploitation #exploit #msexchange #microsoft #cybersecurity #informationsecurity

Malwoverview version 6.1.0 has just been released: github.com/alexandrebor... To install it: $ python -m pip install -U malwoverview This release includes several new features: [+] Virus Exchange support. [+] IPInfo and BGPView support. [+] Global directory support. #malware #threathunting

(QR) Coding My Way Out of Here: C2 in Browser Isolation Environments: cloud.google.com/blog/topics/... #C2 #browser #google #informationsecurity #infosec #threatanalysis

Forensic Science International: Digital Investigation (issue 2024/51): www.sciencedirect.com/journal/fore... #dfir #cybersecurity #digitalforensics #informationsecurity #research

Decrypting CryptProtectMemory without code injection: blog.slowerzs.net/posts/cryptd... #crypto #decryption #cybersecurity #informationsecurity #rdp #windows #programming

OtterRoot: Netfilter Universal Root 1-day (by my colleague Pedro @0xten.bsky.social): osec.io/blog/2024-11... #linux #vulnerability #doublefree #kernel #cybersecurity #exploitation

How to develop n-day chrome exploit for electron applications: github.com/p3rr0x/Blog/... #exploit #cybersecurity #chrome #nday #informationsecurity #vulnerability #exploitation

Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels: www.usenix.org/system/files... #kernel #cybersecurity #linux #zerodays #exploit #android #informationsecurity

Learning LLVM series (by sh4dy on X): sh4dy.com/2024/06/29/l... sh4dy.com/2024/07/06/l... sh4dy.com/2024/11/24/l... #llvm #reversing #programming

Leveling Up Fuzzing: Finding more vulnerabilities with AI: security.googleblog.com/2024/11/leve... #fuzzing #google #vulnerabilities #ai #informationsecurity #cybersecurity

Reverse Engineering iOS 18 Inactivity Reboot naehrdine.blogspot.com/2024/11/reve... #ios #cybersecurity #reverseengineering #informationsecurity #apple

Bluetooth Low Energy GATT Fuzzing: blog.quarkslab.com/bluetooth-lo... #informationsecurity #cybersecurity #fuzzing #bluetooth #hacking #vulnerability #bug #cve

Retrofitting spatial safety to hundreds of millions of lines of C++: security.googleblog.com/2024/11/retr... #securecode #infosec #informationsecurity #cpp #programming #cybersecurity

r2con2024 (PDF + videos) radare.org/con/2024/ #reversing #cybersecurity #informationsecurity #malwareanalysis #reverseengineering

Protecting Signal Keys on Desktop cryptographycaffe.sandboxaq.com/posts/protec... #reverseengineering #crypto #infosec #informationsecurity #cybersecurity

We have now hit 16 million users. We're looking like we might onboard another million today, we'll see. Regardless we'll be far past 16.5 million I'm quite certain.

Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575: labs.watchtowr.com/hop-skip-for... #cybersecurity #fortinet #cyberthreats #vulnerability #exploitation #cve

2023 Top Routinely Exploited Vulnerabilities: media.defense.gov/2024/Nov/12/... #informationsecurity #cybersecurity #vulnerability #exploitation #windows #linux #exploit

CVE-2024-47575: attackerkb.com/topics/OFBGp... #cve #vulnerability #exploitation #exploit #cybersecurity #bug

ProcDump (from SysInternals) for macOS: github.com/Sysinternals... #macos #infosec #informationsecurity #process #informationsecurity #cybersecurity

This is probably the simplest case where we see "JUMPOUT" statements, and the solution for such a case is really easy. #ida #reversing

Inside M4 chips: P cores: eclecticlight.co/2024/11/11/i... #apple #performance #processor #m4 #informationsecurity

Proxmox VE CVE-2024-21545 - Tricking the API into giving you the keys: snyk.io/articles/pro... #virtualization #cybersecurity #hacking #api #redteam #cve #vulnerability #exploitation

Abusing Ubuntu 24.04 features for root privilege escalation: snyk.io/blog/abusing... #cybersecurity #infosec #linux #ubuntu #vulnerability #eop #privescalation #redteam #informationsecurity #blueteam

A deep dive into Linux’s new mseal syscall: blog.trailofbits.com/2024/10/25/a... #syscalls #linux #reverseengineering #cybersecurity