iPower (@ipowerpower) 's Twitter Profile
iPower

@ipowerpower

Just a guy who likes anime, fighting games, hypervisors and reverse engineering. Member of @the_secret_club. Do not DM me about game cheats.

ID: 1248096525152145409

linkhttps://secret.club/ calendar_today09-04-2020 03:53:01

544 Tweet

1,1K Followers

136 Following

snow (@snowyuwa) 's Twitter Profile Photo

Finally got EagleVM in a somewhat stable place after actually writing some tests. Pretty happy with the current state of the project but there is still a lot I want to add. Looking forward to soon releasing the 1.0 🤠 github.com/notpidgey/Eagl…

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

Both Intel SDM v86 and Instruction Set Extensions Programming Reference v56 are out. intel.com/sdm SDM updates are minor. The other adds proper virtualization of IA32_SPEC_CTRL (on top of mask/shadow added before).

Both Intel SDM v86 and Instruction Set Extensions Programming Reference v56 are out. 
intel.com/sdm

SDM updates are minor. The other adds proper virtualization of IA32_SPEC_CTRL (on top of mask/shadow added before).
Windy Bug (@0xwindybug) 's Twitter Profile Photo

Happy to share a draft I should have published a while ago - designing an AV like audio filter driver to control microphone access on a per-process basis, experimenting with some Windows audio subsystem internals in the process. 0mwindybug.github.io/AudioGuard/

x86matthew (@x86matthew) 's Twitter Profile Photo

I created a hypervisor-based emulator for Windows x64 binaries. This project uses Windows Hypervisor Platform to build a virtualized user-mode environment, allowing syscalls and memory accesses to be logged or intercepted. elastic.co/security-labs/… Project: github.com/x86matthew/Win…

GuidedHacking (@guidedhacking) 's Twitter Profile Photo

In the latest and greatest episode of the Guided Hacking Podcast we had the unique honor of interviewing the Titan of Anti-Cheat: Nemi Learn the story behind his prodigious rise to power through the DoD, Blizzard, Riot Games, Byfron and Roblox. 👉youtu.be/6xET66eitYY

In the latest and greatest episode of the Guided Hacking Podcast we had the unique honor of interviewing the Titan of Anti-Cheat: <a href="/0xNemi/">Nemi</a>

Learn the story behind his prodigious rise to power through the DoD, Blizzard, Riot Games, Byfron and Roblox.

👉youtu.be/6xET66eitYY
Satoshi Tanda (@standa_t) 's Twitter Profile Photo

Added AMD support to hvext, the windbg extension for reversing Hyper-V! github.com/tandasat/hvext You can easily check what SVM features are enabled, which MSRs and IO ports are accessible, and how nested page table looks like, for NT, SK and regular VMs.

Djordje Todorovic (@djtodoro) 's Twitter Profile Photo

Check-out github.com/djolertrk/kovi… - a collection of LLVM and GCC plugins for code obfuscation. It is free and open source. I will be adding more plugins that represent different obfuscation techniques.

Takahiro Haruyama (@cci_forensics) 's Twitter Profile Photo

My presentation slides "UEFI Bootkit Hunting: In-Depth Search for Unique Code Behavior" RE//verse are available online github.com/binarly-io/Res…

BINARLY🔬 (@binarly_io) 's Twitter Profile Photo

Some exciting research to share from Binarly REsearchers Takahiro Haruyama and Fabio Pagani -- a novel approach to UEFI bootkit detection. 🔥Read the technical paper: "UEFI Bootkit Hunting: In-Depth Search for Unique Code Behavior" 👉 binarly.io/blog/uefi-boot…

Some exciting research to share from Binarly REsearchers <a href="/cci_forensics/">Takahiro Haruyama</a> and <a href="/pagabuc/">Fabio Pagani</a>  -- a novel approach to UEFI bootkit detection. 

🔥Read the technical paper: "UEFI Bootkit Hunting: In-Depth Search for Unique Code Behavior"

👉 binarly.io/blog/uefi-boot…
Alan Sguigna (@alansguigna) 's Twitter Profile Photo

Intel E-cores behave differently in virtual machines than P-cores. This plays an important role in debugging hypervisor technology within heterogeneous systems. See my article, The Mysterious Behavior of the Intel E-cores, here: asset-intertech.com/resources/blog…

Intel E-cores behave differently in virtual machines than P-cores. This plays an important role in debugging hypervisor technology within heterogeneous systems. See my article, The Mysterious Behavior of the Intel E-cores, here: asset-intertech.com/resources/blog…
Satoshi Tanda (@standa_t) 's Twitter Profile Photo

Nice to see Intel and MSFT's posts on VT-rp / HVPT. If you are interested in playing with the feature, simple example code is here: github.com/tandasat/Hello…

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

The new blog post on supervisor shadow stack restrictions / supervisor shadow-stack control tandasat.github.io/blog/2025/04/0…

Alan Sguigna (@alansguigna) 's Twitter Profile Photo

Good news! The recording of our talk at REcon 2024, JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and DCI/EXDI, presented together with Ivan Rouzanov, is now available on YouTube: youtube.com/watch?v=YKFXWs…. Turn on subtitles.

es3n1n (@es3n1n) 's Twitter Profile Photo

ok its finally done: the improved version of no-defender, a tool that interacts with WSC api to disable window defender the way how microsoft intended it github.com/es3n1n/defendn…

diversenok (@diversenok_zero) 's Twitter Profile Photo

My new blog post 🥳 Improving AFD Socket Visibility for Windows Forensics & Troubleshooting It discusses the low-level API under Winsock (IOCTLs on \Device\Afd handles) and explores the workings of the new socket inspection feature in System Informer 🔥 huntandhackett.com/blog/improving…