Matt Hand
@matterpreter
Director, Security Research @preluderesearch💜 | Author of Evading EDR nostarch.com/evading-edr 📖 | Adversary tradecraft & windows internals 🦠
ID: 152365745
05-06-2010 19:13:45
857 Tweet
9,9K Followers
285 Following
Today I’m sharing a blog post on the implementation of kernel mode shadow stacks on Windows! This post covers actively debugging the Secure Kernel and also outlines why VTL 1 is relied on to help maintain the integrity of the supervisor shadow stacks! connormcgarr.github.io/km-shadow-stac…
The team at Prelude Research is looking for Windows internals researchers, reverse engineers, and people passionate about rethinking how we combat modern adversaries. Join us! jobs.ashbyhq.com/preludesecurit…
Join us in Islander E-I for Connor McGarr’s talk on KCFG AND KCET internals #BHUSA blackhat.com/us-25/briefing…
Ransomware is out-of-context code execution. Full post from Michael Barclay here: preludesecurity.com/blog/unexpecte…
In Connor McGarr's latest post on Windows ARM64 Pointer Authentication, he dissects how PAC fortifies stack integrity and thwarts exploits at the hardware level. Explore the mechanics of this critical security layer and its role in modern Windows defenses. preludesecurity.com/blog/windows-a…