nevul37 (@nevul37) 's Twitter Profile
nevul37

@nevul37

Windows Security Researcher 😉

ID: 1519671591298547712

calendar_today28-04-2022 13:35:26

12 Tweet

25 Followers

78 Following

Yarden Shafir (@yarden_shafir) 's Twitter Profile Photo

Ever wanted to debug the secure kernel but couldn't figure out how? Me too. It's awful. But I eventually got it working and managed to do some cool stuff, so I documented my solutions here in case it helps anyone else: windows-internals.com/secure-kernel-…

Ever wanted to debug the secure kernel but couldn't figure out how? Me too. It's awful.
But I eventually got it working and managed to do some cool stuff, so I documented my solutions here in case it helps anyone  else: windows-internals.com/secure-kernel-…
Connor McGarr (@33y0re) 's Twitter Profile Photo

I am excited to say my talk at Black Hat USA 2025 was accepted where I will be sharing my recent research on kernel-mode CET as well as KCFG on Windows!

I am excited to say my talk at <a href="/BlackHatEvents/">Black Hat</a> USA 2025 was accepted where I will be sharing my recent research on kernel-mode CET as well as KCFG on Windows!
DEVCORE (@d3vc0r3) 's Twitter Profile Photo

Our latest deep dive explores research on Windows Kernel Streaming. Check out Angelboy’s (Angelboy) write-up for key insights and analysis. Read more here: devco.re/blog/2025/05/1… #VulnerabilityResearch #Cybersecurity #WindowsKernel #OffensiveCon

ENKI WhiteHat (@enki_official_x) 's Twitter Profile Photo

Enki WhiteHat has detected activity where Kimsuky abuses GitHub as attack infrastructure. Private GitHub repositories are accessed using PATs, leading to XenoRAT deployment. See the full attack flow and the details of how Kimsuky approaches its victims: enki.co.kr/en/media-cente…

Enki WhiteHat has detected activity where Kimsuky abuses GitHub as attack infrastructure.

Private GitHub repositories are accessed using PATs, leading to XenoRAT deployment.

See the full attack flow and the details of how Kimsuky approaches its victims:
enki.co.kr/en/media-cente…
ptr-yudai (@ptryudai) 's Twitter Profile Photo

CODEGATE CTF 재미있었어요. pwn가 너무 어려웠어요. 저는 Chromium RCE 와 Windows LPE 두 문제만 풀었어요. SBX가 풀리지 않아서 슬퍼요. 운영 여러분 감사합니다!

nevul37 (@nevul37) 's Twitter Profile Photo

My ranking changed from 26th to 22nd with 662.5 points earned over the past year. I placed 8th in the Windows category, collaborating with Hwiwon Lee on the SEC-agent team. Thanks to Microsoft Security Response Center for the update, and to ENKI WhiteHat for the support.

DirectoryRanger (@directoryranger) 's Twitter Profile Photo

Windows Inter Process Communication – A Deep Dive Beyond the Surface, by Haidar Part 1 sud0ru.ghost.io/windows-inter-… Part 2 sud0ru.ghost.io/windows-inter-… Part 3 sud0ru.ghost.io/windows-inter-… Part 4 sud0ru.ghost.io/windows-inter-… Part 5 sud0ru.ghost.io/windows-inter-…

ENKI WhiteHat (@enki_official_x) 's Twitter Profile Photo

Curious how the Codegate 2025 FullChain was meant to be pwned? From RCE to SBX to LPE... the path to SYSTEM is now public. Official write-up is live! #pwn #CTF #Codegate #RCE #SBX #LPE enki.co.kr/en/media-cente…

Alan Sguigna (@alansguigna) 's Twitter Profile Photo

Here are the links to the recordings of my prior two webinars: Debug of Hyper-V, Secure Kernel, VBS Enclaves, Defender, and other secrets: attendee.gotowebinar.com/recording/3590… and Advanced Threat Analysis and Reverse Engineering using AI: attendee.gotowebinar.com/recording/4436…

Here are the links to the recordings of my prior two webinars:
Debug of Hyper-V, Secure Kernel, VBS Enclaves, Defender, and other secrets: attendee.gotowebinar.com/recording/3590…
and Advanced Threat Analysis and Reverse Engineering using AI: attendee.gotowebinar.com/recording/4436…
xvonfers (@xvonfers) 's Twitter Profile Photo

Whoah... $250000 (CVE-2025-4609, similar to CVE-2025-2783/412578726)[412578726][Mojo][IpczDriver]ipcz bug -> renderer duplicate browser process handle -> escape sbx is now open with PoC & exploit(success rate is nearly 70%-80%) issues.chromium.org/issues/4125787… issues.chromium.org/issues/4125787…

Whoah... $250000

(CVE-2025-4609, similar to CVE-2025-2783/412578726)[412578726][Mojo][IpczDriver]ipcz bug -&gt; renderer duplicate browser process handle -&gt; escape sbx is now open with PoC &amp; exploit(success rate is nearly 70%-80%)
issues.chromium.org/issues/4125787…
issues.chromium.org/issues/4125787…
那个饺子🦆(JJ) (@thatjiaozi) 's Twitter Profile Photo

Here is the PoC of the exploit for cve-2025-30712 as well as some of the code for the fuzzer i created to find the bug! github.com/google/securit…

chiefpie (@cplearns2h4ck) 's Twitter Profile Photo

Some more of my bugs in Hyper-V are patched in this month's update. I'm able to exploit it to elevate privileges on the last 10 years of Windows. Also seems like more researchers are targetting this component now.

Some more of my bugs in Hyper-V are patched in this month's update. I'm able to exploit it to elevate privileges on the last 10 years of Windows. Also seems like more researchers are targetting this component now.