ぶどう (@kdbreak) 's Twitter Profile
ぶどう

@kdbreak

NT

ID: 1193177406552428549

calendar_today09-11-2019 14:44:03

32 Tweet

78 Takipçi

533 Takip Edilen

sixtyvividtails (@sixtyvividtails) 's Twitter Profile Photo

Outrageous technique: barely legal use of x86 CPU instruction enables you to catch and 𝗰𝗮𝗻𝗰𝗲𝗹 impeding pagefault before it actually happens. ③: catch PAGE_GUARD or invalid access ⓪: do previously illegal reads at high IRQL, safely #vpgatherqq #vpscatterqq scatter/gather

Outrageous technique: barely legal use of x86 CPU instruction enables you to catch and 𝗰𝗮𝗻𝗰𝗲𝗹 impeding pagefault before it actually happens.

③: catch PAGE_GUARD or invalid access
⓪: do previously illegal reads at high IRQL, safely

#vpgatherqq #vpscatterqq scatter/gather
gmh5225.eth (@gmhzxy) 's Twitter Profile Photo

Now, you can easily retrieve some resources related to game security. Give it a try🙏 awesome-game-security-site.vercel.app

Now, you can easily retrieve some resources related to game security. Give it a try🙏
awesome-game-security-site.vercel.app
eversinc33 🤍🔪⋆。˚ ⋆ (@eversinc33) 's Twitter Profile Photo

Got the transpiler working for my MIPS I VM 🥳Which means that one can basically write plain C with included windows headers and compile it to a PSXecute MIPS module. Also just published the code: github.com/eversinc33/PSX…

sixtyvividtails (@sixtyvividtails) 's Twitter Profile Photo

Small gift for you! 🔺🟦🔺 Code to reliably stop almost any 3rd party Windows security system, via ci!CiValidateFileAsImageType. No privileges needed at all, user rights are enough. Shall work on most OS: 10 22H2, 11 24H2, WS2022. But: it requires CI policies (e.g. HVCI/UMCI on).

Small gift for you! 🔺🟦🔺
Code to reliably stop almost any 3rd party Windows security system, via ci!CiValidateFileAsImageType.
No privileges needed at all, user rights are enough. Shall work on most OS: 10 22H2, 11 24H2, WS2022.
But: it requires CI policies (e.g. HVCI/UMCI on).
Nestra (@nestratech) 's Twitter Profile Photo

🛡️ New on the Nestra blog: Atrexus takes a look at Roblox’s Hyperion anti-tamper and explains how its custom Control Flow Guard can be abused, not just bypassed. A smart take on turning a defense into a weakness. blog.nestra.tech/reverse-engine… #ReverseEngineering #Roblox

Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

We are excited to release our second blog post discussing our technical capabilities of integrating llvm-msvc compiled code into already compiled programs in efforts to build anti-cheats, anti-tamper, packers, import protectors, anti-debug functionality, runtime tracing, and much

Microsoft Developer (@msdev) 's Twitter Profile Photo

Big news: Windows Subsystem for Linux is now Open Source! 🎉 Download WSL, build from source, contribute fixes & features, and join its active development. Learn more: msft.it/6018SjYoE

Big news: Windows Subsystem for Linux is now Open Source! 🎉
 
Download WSL, build from source, contribute fixes & features, and join its active development.
 
Learn more: msft.it/6018SjYoE
ö (@r0keb) 's Twitter Profile Photo

Good morning! Just published a deep dive into PatchGuard internals: how it works, key internal functions, context init, and possible bypasses. r0keb.github.io/posts/PatchGua…

sixtyvividtails (@sixtyvividtails) 's Twitter Profile Photo

Did you know Windows has built-in RAM disk? Not just your regular RAM disk. It's pmem/nvdimm, via scmbus.sys built-in hack! That means you can make 🦆🦆🦆 #dax volume, so data/image mappings (section views) will use "drive" directly! No data persistence; ws22/w11+. EZ 📀 create:

Did you know Windows has built-in RAM disk?
Not just your regular RAM disk. It's pmem/nvdimm, via scmbus.sys built-in hack!

That means you can make 🦆🦆🦆 #dax volume, so data/image mappings (section views) will use "drive" directly!
No data persistence; ws22/w11+. EZ 📀 create:
IDontCode (@_xeroxz) 's Twitter Profile Photo

This is a great read for people interested in hypervisor development in both pre-boot and post-boot (Windows) environment, the source is public and written in rust as well. Great work memN0ps 😀🙌 github.com/memN0ps/matrix… github.com/memN0ps/illusi… memn0ps.github.io/hypervisors-fo…

ころころゴロリ (@k0mkc) 's Twitter Profile Photo

僕のx86リフター・バイナリ書き換えリコンパイラ用にReactでVisualizer書きました。リフター・再コンパイラ・リンカは100% Rustで書かれてるよ。

gmh5225.eth (@gmhzxy) 's Twitter Profile Photo

hyper-reV: A powerful memory introspection & reverse engineering hypervisor leveraging Hyper-V. Read/write guest memory, SLAT hooks, and hide pages, all while evading detection. Supports Intel/AMD, tested on Win10/11. Check it out: github.com/noahware/hyper… #HyperV

Daax (@daaximus) 's Twitter Profile Photo

If you find yourself wanting a pdf for a single instruction (Intel || AMD), and not dealing with the entire manual: revers.engineering/x86/<instruction>.pdf You can see the index @ revers.engineering/x86/ Just as an alternative to FelixCloutier’s site, it will update every new

Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

We’re releasing our analysis of ring-1.io, a major game cheat targeted by multiple studios in recent legal actions. We partially deobfuscated several Themida-protected components and document how it hijacks Hyper-V to inject and manipulate game code.