Andre Lima (@0x4ndr3) 's Twitter Profile
Andre Lima

@0x4ndr3

Exploit dev (windows) + Windows Internals + RE + Fuzzing

ID: 25764742

linkhttps://andrelima.info calendar_today22-03-2009 02:07:27

1,1K Tweet

986 Takipçi

755 Takip Edilen

Yarden Shafir (@yarden_shafir) 's Twitter Profile Photo

Ever wanted to debug the secure kernel but couldn't figure out how? Me too. It's awful. But I eventually got it working and managed to do some cool stuff, so I documented my solutions here in case it helps anyone else: windows-internals.com/secure-kernel-…

Ever wanted to debug the secure kernel but couldn't figure out how? Me too. It's awful.
But I eventually got it working and managed to do some cool stuff, so I documented my solutions here in case it helps anyone  else: windows-internals.com/secure-kernel-…
Andrew Case (@attrc) 's Twitter Profile Photo

I spoke at BSidesPhilly last year on how kernel rootkits operate on Windows 10+ systems and how to detect and defend against them. My closing argument was to enable HVCI everywhere possible or it’s hopeless. Full talk is online: youtu.be/Ow7Az1tcKeU?si…

BSidesCanberra (@bsidescbr) 's Twitter Profile Photo

The BSides Canberra 2024 keynote is now available to watch! "The Exploit Development Life Cycle: From Concept to Compromise" – chompie breaks down the art of exploit dev, from that first spark to full pwnage. Missed it live? Watch it now: youtu.be/ce0bXORSMX4

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

My talk about the recent SMM architecture and security at TheSAS2025 : youtube.com/watch?v=AIGj6Q… The conference was well organized and had plenty of networking opportunities. Though, the best thing was the venue :) It is at a beautiful resort again this year, so you will love it.

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

It is amazing to see someone taking a class and then making stellar output by extending what they learned in the class. Obviously, Jael Koh dedication was the key, but also, Cedric Halbronn must have done a fabulous job helping his students learn and get started. Very cool.

herrcore (@herrcore) 's Twitter Profile Photo

The original video that got a DMCA takedown from VMPSoft had 48K views, let's try and match that number... (p.s. you can pinch to zoom on the video if the text is too small on your phone, or pop open a viewer on your desktop)

Uriel Kosayev (@malfuzzer) 's Twitter Profile Photo

Brand new 😍 40-hour EDR Internals: Research & Development live workshop with my friend Pavel Yosifovich Starts 23 Oct 2025 🚀🔥 Early-bird $1,450 ends 30 Sep; Details: trainsec.net/courses/edr-in… #EDRInternals #KernelDevelopment #ReverseEngineering #CyberSecurityTraining #MalwareAnalysis

Stephen Sims (@steph3nsims) 's Twitter Profile Photo

The heavily updated version of the Advanced Exploit Dev course "SEC760" with my coauthor Alexandre Becholey was just recorded and available at sans.org/sec760 Updates include Linux Chrome V8 Exploitation, IDA 9.1, Kernel Debugging Windows Mitigations, 2025 patch diffs, etc...

Connor McGarr (@33y0re) 's Twitter Profile Photo

You can trace calls to VslpEnterIumSecureMode ("enter/exit" into VTL 1) through the (the value is undocumented?) PERF_VTL1_ENTER ETW perf info mask value and get information about the type of secure call call which occurred (and PID/TID info). The event data is also undocumented.

You can trace calls to VslpEnterIumSecureMode ("enter/exit" into VTL 1) through the (the value is undocumented?) PERF_VTL1_ENTER ETW perf info mask value and get information about the type of secure call call which occurred (and PID/TID info). The event data is also undocumented.
Andre Lima (@0x4ndr3) 's Twitter Profile Photo

Today at Sikkerhetsfestivalen, I attended Yarden Shafir and Greg’s presentation. Yarden has been a huge inspiration to me and my work as a rootkit dev and anything to do with windows internals. Huge highlight for me this year 😊

Today at Sikkerhetsfestivalen, I attended <a href="/yarden_shafir/">Yarden Shafir</a> and Greg’s presentation. Yarden has been a huge inspiration to me and my work as a rootkit dev and anything to do with windows internals. Huge highlight for me this year 😊
Connor McGarr (@33y0re) 's Twitter Profile Photo

Stack tracing and symbol resolution now working side-by-side with the secure call data itself! Going to clean this up a bit more and publish soon.

Stack tracing and symbol resolution now working side-by-side with the secure call data itself! Going to clean this up a bit more and publish soon.
Connor McGarr (@33y0re) 's Twitter Profile Photo

I cleaned up the code I have been working on for the last few days into a tool I’m calling “Vtl1Mon”! Vtl1Mon traces VTL 1 enter (“secure call”) operations via ETW and also call stack/symbol enhances the events! github.com/connormcgarr/V…

Connor McGarr (@33y0re) 's Twitter Profile Photo

Today I am releasing a new blog post on VSM "secure calls" + the SkBridge project to manually issue them!! This blog talks about how VTL 0 requests the services of VTL 1 and outlines common secure call patterns!!! Blog: connormcgarr.github.io/secure-calls-a… SkBridge: github.com/connormcgarr/S…

Today I am releasing a new blog post on VSM "secure calls" + the SkBridge project to manually issue them!!

This blog talks about how VTL 0 requests the services of VTL 1 and outlines common secure call patterns!!!

Blog: connormcgarr.github.io/secure-calls-a…

SkBridge: github.com/connormcgarr/S…
Connor McGarr (@33y0re) 's Twitter Profile Photo

Today I am releasing a new blog on Windows on ARM! It comes from the perspective of one, like myself, who comes from an x86 background and is new, but, interested in Windows on ARM! ELs, OS & hypervisor behavior (with VBS), virtual memory, paging, & more! connormcgarr.github.io/arm64-windows-…