Forrest Orr
@_forrestorr
Red Teamer, low level coding extremist and malware researcher. Windows exploit writer and bug hunter
ID: 908422622219825153
https://www.forrest-orr.net/ 14-09-2017 20:10:05
179 Tweet
4,4K Followers
526 Following
Full moneta bypass with 0FPs! A few more tweaks and I’m hoping peseive is next! Forrest Orr
Last summer I attended the Advanced Windows Heap Exploitation class given by ς๏гєɭคภς0๔3г ([email protected]) and cannot speak highly enough of his skill, dedication and enthusiasm for the topic. This is the training I recommend for learning memory corruption exploits. Truly one of a kind.
I’m surprised to have recently learned that there does not seem to be a trivial way to receive notifications of suspended process launches in Windows via kernel proc notif callback, kernel ETW or EtwTi. Any ideas on how to do this? Pavel Yosifovich