Ori Damari
@0xrepnz
Low level developer,
Reverse engineer,
Windows kernel. Read my blog! 😋
ID: 996312779509420033
https://repnz.github.io 15-05-2018 08:54:12
1,1K Tweet
5,5K Followers
251 Following
Starting 2026 with a new blog! I've really been enjoying my Windows on ARM machine - so my post is about interrupts for WoA. This includes x64/ARM differences, virtual interrupts, Hyper-V's synthetic controller, and Secure Kernel interrupts/intercepts connormcgarr.github.io/windows-arm64-…
Reversing a Microsoft-Signed Rootkit: The Netfilter Driver - Reverse Engineering Attempts. Author: Splintersfury Great detailed write-up. If anyone interested in driver reversing, do check his work out. 🫡🔥 splintersfury.github.io/mal_blog/post/…
THE CHINESE GOVERNMENT USED MICROSOFT WARBIRD APIS FOR OBFUSCATION > proof-of-concept by Michael B. in 2023 > 30 stars on GitHub > 62 likes on Xitter This is fucking FIRE research. Insanely slept on research. I am FLABBERGASTED.
Patch diffing + RCA for clfs.sys can awhile. I gave the diff + binary to a local LLM. It mapped the UAF path, race condition, all IOCTLs in <20 min LLMs don't replace the work, they are momentum. New blog post following the UAF trail of CVE-2025-29824: clearbluejar.github.io/posts/how-llms…
In the final part of his blog series, James Forshaw tells the story of how a bug was introduced into a Windows API. Code re-writes can improve security, but it’s important not to forget the security properties the code needs to enforce in the process. projectzero.google/2026/02/gphfh-…