winterknife 🌻 (@_winterknife_) 's Twitter Profile
winterknife 🌻

@_winterknife_

low-level developer with a focus on 𝙸𝚗𝚝𝚎𝚕 𝚡𝟾𝟼 ISA devices running 𝚆𝚒𝚗𝚍𝚘𝚠𝚜 | R&D @BHinfoSecurity | infosec.exchange/@winterknife

ID: 870829423645388800

linkhttps://lampreylabs.com calendar_today03-06-2017 02:28:08

528 Tweet

3,3K Followers

4,4K Following

Connor McGarr (@33y0re) 's Twitter Profile Photo

Today I am happy to release a new blog post about Pointer Authentication (PAC) on Windows ARM64! This post takes a look at the Windows implementation of PAC in both user-mode and kernel-mode. I must say, I have REALLY been enjoying Windows on ARM!! preludesecurity.com/blog/windows-a…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Latest ≠ Greatest? A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS from our very own Markus Wulftange who loves converting n-days to 0-days code-white.com/blog/wsus-cve-…

Prelude Research (@preluderesearch) 's Twitter Profile Photo

New research from John U: a clean loader-lock escape using the PEB's PostProcessInitRoutine. Read the analysis and PoC code 📃 preludesecurity.com/blog/escaping-…

Sean Metcalf (@pyrotek3) 's Twitter Profile Photo

The KB5067036 update is now available on Windows 11 computers running 24H2 &25H2 and includes the Administrator Protection feature. This feature leverages Windows Hello (PIN or biometric) for administrator actions and uses a temporary token which is destroyed after use. This

The KB5067036 update is now available on Windows 11 computers running 24H2 &25H2 and includes the Administrator Protection feature. This feature leverages Windows Hello (PIN or biometric) for administrator actions and uses a temporary token which is destroyed after use. This
D4m0n (@d4m0n_8) 's Twitter Profile Photo

It’s time to publish the blog post about the bug that won at P2O Berlin 2025. Enjoy! With this post, I mark my last moment as a researcher at Out of Bounds. I’m moving on to a new place for a fresh start.🔥🦎 oobs.io/posts/four-byt…

Check Point Research (@_cpresearch_) 's Twitter Profile Photo

🚨 We uncovered #security #vulnerabilities in #Windows graphics. #CVE-2025-30388 and CVE-2025-53766 are #BufferOverflows enabling #RemoteCodeExecution. CVE-2025-47984 leaks memory over the network due to an incomplete fix. 👇research.checkpoint.com/2025/drawn-to-…

Cyber Statecraft (@cyberstatecraft) 's Twitter Profile Photo

Many tradeoffs exist in managing the flow of offensive cyber capabilities. Winnona 💾, James Shires, JD Work, Michele Campobasso, et al. Dive into Access-as-a-Service markets and how it shapes these transactions in atlanticcouncil.org/in-depth-resea…

SAERXCIT (@saerxcit) 's Twitter Profile Photo

First blogpost in a while, check it out! PoC is a Crystal Palace shared library, format inspired by Rasta Mouse's LibTP x.com/AlmondOffSec/s…

Ido Veltzman (@idov31) 's Twitter Profile Photo

If you wanted to show a party trick to your friend or just leak kernel addresses via admin privileges you can use this repository: github.com/Idov31/EtwLeak… Since it can only leak addresses and only using administrative privileges, it isn't breaking a security boundary. 1/3

Unit 42 (@unit42_intel) 's Twitter Profile Photo

Unit 42 uncovered LANDFALL, previously unknown Android spyware that exploited a zero-day vulnerability CVE-2025-21042 in Samsung Android’s image processing library. This is the first public analysis of the campaign and the implant. Read more: bit.ly/47rwbS0

Unit 42 uncovered LANDFALL, previously unknown Android spyware that exploited a zero-day vulnerability CVE-2025-21042 in Samsung Android’s image processing library. This is the first public analysis of the campaign and the implant. Read more: bit.ly/47rwbS0
incendiumrocks (@incendiumrockz) 's Twitter Profile Photo

During my research into COM/DCOM I stumbled upon a vulnerability that deletes the Boot Configuration Data (BCD) in the registry as low privileged user. For this vulnerability CVE-2025-59253 was assigned by Microsoft. warpnet.nl/blog/deleting-…

diversenok (@diversenok_zero) 's Twitter Profile Photo

I wanted to understand what information is available in .pdb files, so I made a tool for it 🔎🪲 Welcome DiaSymbolView - a debug symbol hierarchy and properties viewer based on MSDIA: github.com/diversenok/Dia…

I wanted to understand what information is available in .pdb files, so I made a tool for it 🔎🪲

Welcome DiaSymbolView - a debug symbol hierarchy and properties viewer based on MSDIA:
github.com/diversenok/Dia…
SAERXCIT (@saerxcit) 's Twitter Profile Photo

Publishing github.com/SAERXCIT/LibTP…! It's a generalisation of LibTPLoadLib to proxy APIs with an arbitrary number of args. Provided as a Crystal Palace shared library. API made compatible with Rasta Mouse 's LibTP. Hooks are provided to show off the newest Crystal Palace features

Alisa Esage Шевченко (@alisaesage) 's Twitter Profile Photo

Black Hat published my talk on reverse engineering Qualcomm Hexagon hardware debugging magic, with an introduction by bunnie: youtube.com/watch?v=pGyeWf… @blackhatevents Apple uses Snapdragon chips for cellular modem in 16-17 (again), I'm an iPhone baseband security

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

⌛ It's been a while since I published a "real" blog, hope you enjoy it! 👉 cloud.google.com/blog/topics/th… This was part of the material we delivered at our DEFCON33 workshop too :)

Prelude Research (@preluderesearch) 's Twitter Profile Photo

New on the blog: Michael Barclay revives registry-based tradecraft using a telemetry gap in the hive restoration process. The blog also includes PoC code and detection guidance. 📃 preludesecurity.com/blog/rehabilit…

780th Military Intelligence Brigade (Cyber) (@780thc) 's Twitter Profile Photo

Trellix: The Evolution of Russian Physical-Cyber Espionage | Moscow’s intelligence services continue to rely on close access operations that blur the line between cyber and physical espionage. trellix.com/blogs/research… Trellix