Dor
@dor00tkit
ID: 1090715609791414279
https://dor00tkit.github.io/Dor00tkit/ 30-01-2019 20:57:20
482 Tweet
278 Followers
629 Following
Thanks to Winsider Seminars & Solutions (Yarden Shafir & Alex Ionescu) for Sponsoring #OST2 at the Gold🥇 level! Learn more about them here: windows-internals.com
Ben Sadeghipour Pick a niche, become an expert, find bugs maybe even 0days or reverse n-days, and write blogs. Even if you don’t hit those $100k bounties, it’ll be a stepping stone toward a $100k job. What niche? How to pick? Examples? infosec being so vast from web3 sec to web2, mobile,
My videos for Flare-On 2024 are live! Watch me reverse engineer all the challenges from start to end. + Commentary video featuring SuperFashi, where we review the chals together. * 45 hours of content * 400+ GB of raw footage Merry Christmas! youtube.com/watch?v=vwW9xv…
[Research] Fuzzy Fuzzing with WinAFL Part 1 hackyboiz.github.io/2021/05/23/fab… Diving into WinAFL for bug hunting, we've crafted a Harness to execute target functions repeatedly without process termination. Tested with DynamoRIO, our setup's ready for action. Now, let's fuzz like crazy to
We're looking for more classes on enterprise security. If you have an idea for a class, let us know at [email protected]!
Today I’m sharing a blog post on the implementation of kernel mode shadow stacks on Windows! This post covers actively debugging the Secure Kernel and also outlines why VTL 1 is relied on to help maintain the integrity of the supervisor shadow stacks! connormcgarr.github.io/km-shadow-stac…
First drop from my upcoming release: 130+ Linux-based IoT CVEs (2024 & earlier) with real vulnerable firmware. All hand-curated. 👉 github.com/attilaszia/lin… Includes vulnerable binary paths — soon, finding the exact vulnerable effective addresses will be very simple, stay tuned:)