Andre Lima
@0x4ndr3
Exploit dev (windows) + Windows Internals + RE + Fuzzing
ID: 25764742
https://andrelima.info 22-03-2009 02:07:27
1,1K Tweet
986 Takipçi
755 Takip Edilen
I spoke at BSidesPhilly last year on how kernel rootkits operate on Windows 10+ systems and how to detect and defend against them. My closing argument was to enable HVCI everywhere possible or it’s hopeless. Full talk is online: youtu.be/Ow7Az1tcKeU?si…
My talk about the recent SMM architecture and security at TheSAS2025 : youtube.com/watch?v=AIGj6Q… The conference was well organized and had plenty of networking opportunities. Though, the best thing was the venue :) It is at a beautiful resort again this year, so you will love it.
Brand new 😍 40-hour EDR Internals: Research & Development live workshop with my friend Pavel Yosifovich Starts 23 Oct 2025 🚀🔥 Early-bird $1,450 ends 30 Sep; Details: trainsec.net/courses/edr-in… #EDRInternals #KernelDevelopment #ReverseEngineering #CyberSecurityTraining #MalwareAnalysis
The heavily updated version of the Advanced Exploit Dev course "SEC760" with my coauthor Alexandre Becholey was just recorded and available at sans.org/sec760 Updates include Linux Chrome V8 Exploitation, IDA 9.1, Kernel Debugging Windows Mitigations, 2025 patch diffs, etc...
Today at Sikkerhetsfestivalen, I attended Yarden Shafir and Greg’s presentation. Yarden has been a huge inspiration to me and my work as a rootkit dev and anything to do with windows internals. Huge highlight for me this year 😊
Today I am releasing a new blog on Windows on ARM! It comes from the perspective of one, like myself, who comes from an x86 background and is new, but, interested in Windows on ARM! ELs, OS & hypervisor behavior (with VBS), virtual memory, paging, & more! connormcgarr.github.io/arm64-windows-…