#  @0xor0ne 0xor0ne 0xor0ne posts on X about credits, engineering, reverse, windows the most. They currently have [------] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours. ### Engagements: [------] [#](/creator/twitter::1293289704843075586/interactions)  - [--] Week [-------] +103% - [--] Month [-------] -16% - [--] Months [---------] +43% - [--] Year [---------] -53% ### Mentions: [--] [#](/creator/twitter::1293289704843075586/posts_active)  - [--] Week [--] +71% - [--] Month [--] +18% - [--] Months [---] +56% - [--] Year [---] -8.90% ### Followers: [------] [#](/creator/twitter::1293289704843075586/followers)  - [--] Week [------] +0.21% - [--] Month [------] +1.40% - [--] Months [------] +8.90% - [--] Year [------] +21% ### CreatorRank: [-------] [#](/creator/twitter::1293289704843075586/influencer_rank)  ### Social Influence **Social category influence** [technology brands](/list/technology-brands) 9.91% [stocks](/list/stocks) 1.8% [countries](/list/countries) 1.8% [gaming](/list/gaming) 0.9% **Social topic influence** [credits](/topic/credits) 23.42%, [engineering](/topic/engineering) #2221, [reverse](/topic/reverse) #433, [windows](/topic/windows) 5.41%, [tools](/topic/tools) #1799, [tplink](/topic/tplink) #2, [stack](/topic/stack) 2.7%, [blog](/topic/blog) 2.7%, [module](/topic/module) #95, [posts](/topic/posts) #492 **Top accounts mentioned or mentioned by** [@transilienceai](/creator/undefined) [@voidstarsec](/creator/undefined) [@sergioprado](/creator/undefined) [@intezerlabs](/creator/undefined) [@watchfulip](/creator/undefined) [@quarkslab](/creator/undefined) [@palantir555](/creator/undefined) [@limitedresults](/creator/undefined) [@binarlyio](/creator/undefined) [@jmswrnr](/creator/undefined) [@k3170makan](/creator/undefined) [@cybernews_alert](/creator/undefined) [@codewhitesec](/creator/undefined) [@matheusgarbelin](/creator/undefined) [@brk0v](/creator/undefined) [@qkaiser](/creator/undefined) [@hyprdude](/creator/undefined) [@r0rt1z2](/creator/undefined) [@0xtrikkss](/creator/undefined) [@bcreusillet](/creator/undefined) **Top assets mentioned** [Alphabet Inc Class A (GOOGL)](/topic/$googl) ### Top Social Posts Top posts by engagements in the last [--] hours "Unauthenticated RCE in NetSupport Manager by chaining CVE-2025-34164 (heap OOB write) and CVE-2025-34165 (stack OOB read) Credits Fabian Weber (@codewhitesec) #infosec https://code-white.com/blog/2026-01-nsm-rce/ https://code-white.com/blog/2026-01-nsm-rce/" [X Link](https://x.com/0xor0ne/status/2020543284297281727) 2026-02-08T17:00Z 87.4K followers, [----] engagements "If you're interested in bluetooth low level hacking take a look at this cool project by Matheus Eduardo Garbelini (@MatheusGarbelin) Active Bluetooth BR/EDR Sniffer/Injector: #bluetooth #esp32 #espressif #hacking #infosec https://github.com/Matheus-Garbelini/esp32_bluetooth_classic_sniffer https://github.com/Matheus-Garbelini/esp32_bluetooth_classic_sniffer" [X Link](https://x.com/0xor0ne/status/1606341450425311232) 2022-12-23T17:30Z 87.3K followers, 78.6K engagements "Good refresh series on Linux basics by @brk0v Files pipes processes etc. Prologue: Files: Pipes: Processes: Pseudoterminals: #Linux #learning https://biriukov.dev/docs/fd-pipe-session-terminal/4-terminals-and-pseudoterminals/ https://biriukov.dev/docs/fd-pipe-session-terminal/3-process-groups-jobs-and-sessions/ https://biriukov.dev/docs/fd-pipe-session-terminal/2-pipes/ https://biriukov.dev/docs/fd-pipe-session-terminal/1-file-descriptor-and-open-file-description/" [X Link](https://x.com/anyuser/status/1616533576589213696) 2023-01-20T20:30Z 87.3K followers, 61.1K engagements "Reverse engineering and pwning a Google Home Mini smart speaker. Great blog post for anyone interested in embedded device security. #iot #embedded #infsec #cybersecurity https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html" [X Link](https://x.com/anyuser/status/1620693504451137540) 2023-02-01T08:00Z 87.3K followers, 56.6K engagements "Very useful guide for learning Make (and Makefiles) #make #makefile #infosec #cybersecurity https://makefiletutorial.com https://makefiletutorial.com" [X Link](https://x.com/anyuser/status/1670499134644670471) 2023-06-18T18:30Z 87.3K followers, 111.6K engagements "Introduction guide to Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/" [X Link](https://x.com/anyuser/status/1712551261780742440) 2023-10-12T19:30Z 87.3K followers, 88K engagements "Excellent research on reverse engineering and pwning a Google Home Mini smart speaker. A must read if you are interested in embedded device security and vulnerability research. #iot #embedded #infosec #cybersecurity https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html" [X Link](https://x.com/anyuser/status/1716775318839537703) 2023-10-24T11:15Z 87.3K followers, 54.8K engagements "Introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #cybersecurity https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/anyuser/status/1886097307638047009) 2025-02-02T17:00Z 87.3K followers, 40.8K engagements "Valve Anti-Cheat (VAC) reverse engineering #infosec https://codeneverdies.github.io/posts/gh-2/ https://codeneverdies.github.io/posts/gh-2/" [X Link](https://x.com/0xor0ne/status/1971960572171124812) 2025-09-27T15:30Z 87.3K followers, 48.8K engagements "TP-Link Tapo C200 reverse engineering and exploitation Credits @qkaiser #infosec #embedded https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/ https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/" [X Link](https://x.com/0xor0ne/status/2016187059593949391) 2026-01-27T16:30Z 87.2K followers, 29.9K engagements "Exploiting vulnerabilities in MediaTek MT76xx and MT7915 Wifi chipset family Credits @hyprdude #infosec https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html" [X Link](https://x.com/0xor0ne/status/2016783546619191409) 2026-01-29T08:00Z 87.2K followers, 12.8K engagements "Heap overflow in MediaTek's DA2 USB file download handler that gives code execution on (Carbonara) patched V6 devices Research by @r0rt1z2 and shomy #infosec https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/ https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/" [X Link](https://x.com/0xor0ne/status/2017636519947743368) 2026-01-31T16:30Z 87.3K followers, [----] engagements "Clang Hardening Cheat Sheet (2026) Credits @0xTRIKKSS and @bcreusillet (@quarkslab) #infosec https://blog.quarkslab.com/clang-hardening-cheat-sheet-ten-years-later.html https://blog.quarkslab.com/clang-hardening-cheat-sheet-ten-years-later.html" [X Link](https://x.com/0xor0ne/status/2018006846569648474) 2026-02-01T17:01Z 87.3K followers, [----] engagements "Beginners intro to Linux kernel fuzzing and vulnerability research (2024 blog post series by @slava_moskvin_) Part 1: Part 2: Part 3: #Linux #cybersecurity https://slavamoskvin.com/finding-bugs-in-kernel.-part-2-fuzzing-the-actual-kernel/ https://slavamoskvin.com/finding-bugs-in-kernel.-part-1-crashing-a-vulnerable-driver-with-syzkaller/ https://slavamoskvin.com/hunting-bugs-in-linux-kernel-with-kasan-how-to-use-it-whats-the-benefit/ https://slavamoskvin.com/finding-bugs-in-kernel.-part-2-fuzzing-the-actual-kernel/" [X Link](https://x.com/0xor0ne/status/2019441325595152862) 2026-02-05T16:01Z 87.3K followers, [----] engagements "Cool series to learn IoT/embedded devices reverse engineering (credits @Palantir555) Debug Ports: Firmware: Data: Flash: Digging the Firmware: #iot https://buff.ly/3WUY50u https://buff.ly/3WKnhay https://buff.ly/3WRz5r4 https://buff.ly/3WHNOFo https://buff.ly/3WGw513 https://buff.ly/3WUY50u https://buff.ly/3WKnhay https://buff.ly/3WRz5r4 https://buff.ly/3WHNOFo https://buff.ly/3WGw513" [X Link](https://x.com/0xor0ne/status/1673651159427416064) 2023-06-27T11:15Z 87.3K followers, 63.4K engagements "Great free guide for learninig Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/" [X Link](https://x.com/0xor0ne/status/1690430489314594816) 2023-08-12T18:30Z 87.3K followers, 65.7K engagements "If you are a beginner and interested in malware analysis this is an excellent introduction series by @IntezerLabs Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/" [X Link](https://x.com/0xor0ne/status/1746253336636956993) 2024-01-13T19:30Z 87.3K followers, 46K engagements "Interesting project attempting to reverse engineering the precompiled Wi-Fi stack of ESP32 SoC to recreate an open source version Part 1: Part 2: Repo: #esp32 #infosec https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/" [X Link](https://x.com/0xor0ne/status/1764206593799807015) 2024-03-03T08:30Z 87.3K followers, 33.6K engagements "Reverse engineering of ESP32's precompiled Wi-Fi stack Part 1: Part 2: Repo: #esp32 #cybersecurity https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/" [X Link](https://x.com/0xor0ne/status/1822173551706685850) 2024-08-10T07:30Z 87.3K followers, 39.9K engagements "Command & Conquer: network architecture exposed attack surface discovered vulnerabilities and exploitation Research by Bryan Alexander and Jordan Whitehead #infosec https://www.atredis.com/blog/2026/1/26/generals https://www.atredis.com/blog/2026/1/26/generals" [X Link](https://x.com/0xor0ne/status/2020173234604236897) 2026-02-07T16:30Z 87.3K followers, [----] engagements "Cybersecurity related awesome list: blog posts write-ups papers and tools related to cybersecurity reverse engineering and exploitation #cybersecurity #infosec https://github.com/0xor0ne/awesome-list https://github.com/0xor0ne/awesome-list" [X Link](https://x.com/0xor0ne/status/1928059503238324563) 2025-05-29T12:03Z 87.4K followers, 52.9K engagements "Escalate privileges from a rooted user space (N-EL0) to the highest privilege level in the Secure World (S-EL3) (Android Xiaomi Redmi 11s) (CCC 2025) #infosec https://media.ccc.de/v/39c3-not-to-be-trusted-a-fiasco-in-android-tees https://media.ccc.de/v/39c3-not-to-be-trusted-a-fiasco-in-android-tees" [X Link](https://x.com/0xor0ne/status/2021260593978593432) 2026-02-10T16:30Z 87.4K followers, [----] engagements "Great 3-parts series on 0-click exploit chain targeting Android Pixel [--] Arbitrary code execution in mediacodec - kernel privilege escalation Part 1: Part 2: Part 3: Research by Natalie Silvanovich (@natashenka) and Seth Jenkins (@__sethJenkins) #infosec https://projectzero.google/2026/01/pixel-0-click-part-3.html https://projectzero.google/2026/01/pixel-0-click-part-2.html https://projectzero.google/2026/01/pixel-0-click-part-1.html https://projectzero.google/2026/01/pixel-0-click-part-3.html https://projectzero.google/2026/01/pixel-0-click-part-2.html" [X Link](https://x.com/0xor0ne/status/2021619971084730732) 2026-02-11T16:18Z 87.4K followers, [----] engagements "Deep-dive by @landaire into reverse engineering Splinter Cell's (2002) .lin Unreal Engine [--] archive format #ReverseEngineering https://landaire.net/a-file-format-uncracked-for-20-years/ https://landaire.net/a-file-format-uncracked-for-20-years/" [X Link](https://x.com/0xor0ne/status/2021857072824938577) 2026-02-12T08:01Z 87.4K followers, [----] engagements "Authenticated RCE on TP-Link AX10 & AX1500 through CWMP exploitation (CVE-2025-9961) #infosec https://blog.byteray.co.uk/exploiting-zero-day-cve-2025-9961-in-the-tp-link-ax10-router-8745f9af9c46 https://blog.byteray.co.uk/exploiting-zero-day-cve-2025-9961-in-the-tp-link-ax10-router-8745f9af9c46" [X Link](https://x.com/0xor0ne/status/2022710007108706562) 2026-02-14T16:30Z 87.4K followers, 60.5K engagements "Very cool repo for learning how to use rust for offensive security https://github.com/trickster0/OffensiveRust https://github.com/trickster0/OffensiveRust" [X Link](https://x.com/0xor0ne/status/1604891873100832768) 2022-12-19T17:30Z 87.4K followers, 45.7K engagements "Cool secure boot bypass by fault injection in ESP32 CPUs by @LimitedResults #embedded #iot #hardware #faultinjection #infosec https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/ https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/" [X Link](https://x.com/0xor0ne/status/1610327674374717440) 2023-01-03T17:30Z 87.4K followers, 69.3K engagements "Just a reminder of a few great tools for firmware unpacking repacking and analysis binwalk: EMBA: unblob: ofrak: #iot #embedded #reverseengineering #infosec https://github.com/redballoonsecurity/ofrak https://github.com/onekey-sec/unblob https://github.com/e-m-b-a/emba https://github.com/ReFirmLabs/binwalk https://github.com/redballoonsecurity/ofrak https://github.com/onekey-sec/unblob https://github.com/e-m-b-a/emba https://github.com/ReFirmLabs/binwalk" [X Link](https://x.com/0xor0ne/status/1619251448818155520) 2023-01-28T08:30Z 87.4K followers, 95K engagements "Nice series introducing cryptography concepts for beginners (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/" [X Link](https://x.com/0xor0ne/status/1649843017249964032) 2023-04-22T18:30Z 87.3K followers, 73.6K engagements "Nice intro for beginners to bluetooth communications reverse engineering (Domyos EL500) Credits @Palantir555 #bluetooth https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/ https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/" [X Link](https://x.com/0xor0ne/status/1657453213010784258) 2023-05-13T18:30Z 87.4K followers, 58.5K engagements "Secure boot bypass by fault injection in (Espressif) ESP32 CPUs Credits @LimitedResults #embedded #iot #hardware #faultinjection #infosec https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/ https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/" [X Link](https://x.com/0xor0ne/status/1662722898660917248) 2023-05-28T07:30Z 87.4K followers, 65K engagements "Excellent free book for anyone interested in Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/" [X Link](https://x.com/0xor0ne/status/1667207618220138496) 2023-06-09T16:30Z 87.4K followers, 227.8K engagements "MikroTik routers reverse engineering and exploitation Excellent work by @hgarrereyn and @__comedian Blog post: Slides (RECon): #iot #mikrotik #cybsersecurity https://github.com/MarginResearch/resources/blob/83e402a86370f7c3acf8bb3ad982c1fee89c9b53/documents/Pulling_MikroTik_into_the_Limelight.pdf https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/ https://github.com/MarginResearch/resources/blob/83e402a86370f7c3acf8bb3ad982c1fee89c9b53/documents/Pulling_MikroTik_into_the_Limelight.pdf https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/" [X Link](https://x.com/0xor0ne/status/1731229299384984022) 2023-12-03T08:30Z 87.4K followers, 56.7K engagements "Introduction to reverse engineering and malware analysis Part 1: Part 2: #malware #cybersecurity https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/" [X Link](https://x.com/0xor0ne/status/1891042344926928992) 2025-02-16T08:30Z 87.3K followers, 36.6K engagements "TP-Link (Tapo) C210 cloud camera: bootloader vulnerability and firmware decryption by @Watchful_IP #infosec https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html" [X Link](https://x.com/0xor0ne/status/2018354617931768124) 2026-02-02T16:03Z 87.4K followers, 15.2K engagements ""DIRTYFREE: Simplified Data-Oriented Programming in the Linux Kernel" (paper) Authors: Yoochan Lee Hyuk Kwon and Thorsten Holz #infosec #Linux https://leeyoochan.github.io/assets/pdf/DirtyFree_NDSS_2026.pdf https://leeyoochan.github.io/assets/pdf/DirtyFree_NDSS_2026.pdf" [X Link](https://x.com/0xor0ne/status/2018723757104202027) 2026-02-03T16:30Z 87.3K followers, [----] engagements "CVE-2025-3052 explained: running unsigned code during the UEFI boot process Credits @binarly_io #infosec https://www.binarly.io/blog/another-crack-in-the-chain-of-trust https://www.binarly.io/blog/another-crack-in-the-chain-of-trust" [X Link](https://x.com/0xor0ne/status/2019803705537597562) 2026-02-06T16:01Z 87.3K followers, [----] engagements ""From Zero to QEMU: A journey into system emulation" (slide deck by Antonio Nappa) #infosec #qemu https://docs.google.com/presentation/d/1g0hTGKXWf6EvyUIjw4qomJ5CGrV245nbGn5p-yNu1Sc/editslide=id.g357295fe39c_0_3#slide=id.g357295fe39c_0_3 https://docs.google.com/presentation/d/1g0hTGKXWf6EvyUIjw4qomJ5CGrV245nbGn5p-yNu1Sc/editslide=id.g357295fe39c_0_3#slide=id.g357295fe39c_0_3" [X Link](https://x.com/0xor0ne/status/2018595582076473401) 2026-02-03T08:01Z 87.4K followers, 28.8K engagements "Reverse engineering Realtek RTL8761B* Bluetooth chips to make better Bluetooth security tools & classes (slide deck by @XenoKovah) #infosec https://darkmentor.com/publication/2025-11-hardweario/ https://darkmentor.com/publication/2025-11-hardweario/" [X Link](https://x.com/0xor0ne/status/2019320295308341375) 2026-02-05T08:00Z 87.4K followers, 14.4K engagements "Deep dive into how Windows on ARM handles interrupts by Connor McGarr (@33y0re) #Windows #infosec https://connormcgarr.github.io/windows-arm64-interrupts/ https://connormcgarr.github.io/windows-arm64-interrupts/" [X Link](https://x.com/0xor0ne/status/2019682667474592109) 2026-02-06T08:00Z 87.4K followers, [----] engagements "TP-Link Tapo C200 IP camera: security analysis and exploitation by @evilsocket #infosec #iot https://www.evilsocket.net/2025/12/18/TP-Link-Tapo-C200-Hardcoded-Keys-Buffer-Overflows-and-Privacy-in-the-Era-of-AI-Assisted-Reverse-Engineering/ https://www.evilsocket.net/2025/12/18/TP-Link-Tapo-C200-Hardcoded-Keys-Buffer-Overflows-and-Privacy-in-the-Era-of-AI-Assisted-Reverse-Engineering/" [X Link](https://x.com/0xor0ne/status/2011710144606781535) 2026-01-15T08:00Z 87.4K followers, 142.6K engagements "Airoha Bluetooth RACE vulnerabilities (CVE-2025-20700/20701/20702) Blog post: White paper: Credits Dennis Heinze Frieder Steinmetz (@ERNW_ITSec) #infosec #bluetooth https://static.ernw.de/whitepaper/ERNW_White_Paper_74_1.0.pdf https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/ https://static.ernw.de/whitepaper/ERNW_White_Paper_74_1.0.pdf https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/" [X Link](https://x.com/0xor0ne/status/2019079118717882717) 2026-02-04T16:02Z 87.4K followers, [----] engagements "Short beginners introduction to virtual memory #cybersecurity https://nghiant3223.github.io/2025/05/29/fundamental_of_virtual_memory.html https://nghiant3223.github.io/2025/05/29/fundamental_of_virtual_memory.html" [X Link](https://x.com/0xor0ne/status/2020890806840590559) 2026-02-09T16:01Z 87.4K followers, [----] engagements "Exploiting Linux by abusing page table entries #Linux #infosec https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326 https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326" [X Link](https://x.com/0xor0ne/status/2021132261588881765) 2026-02-10T08:00Z 87.4K followers, 11.1K engagements "Dirty Pageflags: abusing page table entries for exploiting Linux #Linux #infosec https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326 https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326" [X Link](https://x.com/0xor0ne/status/2021978129317638628) 2026-02-12T16:02Z 87.4K followers, [----] engagements "MediaTek exploit that lets you write to arbitrary memory via the Download Agent bypassing DA2 signature verification Blog post by @shomykohai #infosec https://shomy.is-a.dev/blog/article/serving-carbonara https://shomy.is-a.dev/blog/article/serving-carbonara" [X Link](https://x.com/0xor0ne/status/2022219416595755054) 2026-02-13T08:00Z 87.4K followers, [----] engagements "Cybersecurity blog posts writeups papers and tools #infosec https://github.com/0xor0ne/awesome-list https://github.com/0xor0ne/awesome-list" [X Link](https://x.com/0xor0ne/status/2022340634669920335) 2026-02-13T16:02Z 87.4K followers, 26.5K engagements "Three-part series by @binarly_io on Supermicro BMC firmware authentication bypasses Part 1: Part 2: Part 3: #infosec https://www.binarly.io/blog/have-you-patched-are-you-sure-the-story-of-the-sticky-supermicro-bmc-bugs https://www.binarly.io/blog/broken-trust-fixed-supermicro-bmc-bug-gains-a-new-life-in-two-new-vulnerabilities https://www.binarly.io/blog/ghost-in-the-controller-abusing-supermicro-bmc-firmware-verification https://www.binarly.io/blog/have-you-patched-are-you-sure-the-story-of-the-sticky-supermicro-bmc-bugs" [X Link](https://x.com/0xor0ne/status/2023079916359553093) 2026-02-15T17:00Z 87.4K followers, [----] engagements "Here are a few resources for getting started with Satellite hacking and CTFs Satellite Hacking Demystified: Hack-a-sat writeups: Hack-a-sat players corner: #satellite #infosec https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/Satellite-Hacking-Demystified/ https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/Satellite-Hacking-Demystified/" [X Link](https://x.com/anyuser/status/1689169806119882752) 2023-08-09T07:00Z 87.3K followers, 60.7K engagements "Excellent introduction to cryptography concepts for beginners with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/" [X Link](https://x.com/anyuser/status/1690996983064895489) 2023-08-14T08:01Z 87.3K followers, 84.8K engagements "Interesting series on how virtualization works (VMware XEN QEMU) Credits @LordNoteworthy Part 1: Part 2: Part 3: Part 4: #virtualization #infotech https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu https://docs.saferwall.com/blog/virtualization-internals-part-3-xen-and-paravirtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/ https://docs.saferwall.com/blog/virtualization-internals-part-1-intro-to-virtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu" [X Link](https://x.com/0xor0ne/status/1699482783557534073) 2023-09-06T18:00Z 87.3K followers, 63.6K engagements "Beginner introduction to cryptography concepts with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/" [X Link](https://x.com/anyuser/status/1711637730692587612) 2023-10-10T07:00Z 87.3K followers, 87.2K engagements "Windows rootkit development for red teaming Excellent series by @Idov31 Part 1: Part 2: Part 3: Part 4: PArt 5: #windows #driver #kernel #rootkit #redteam https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html" [X Link](https://x.com/anyuser/status/1715087946427105415) 2023-10-19T19:30Z 87.3K followers, 61.4K engagements "Reverse engineering the Brightway (Xiaomi) scooters Interesting blog post for anyone interested in embedded devices reverse engineering #reverseengineering #cybersecurity #infotech https://robocoffee.de/p=436 https://robocoffee.de/p=436" [X Link](https://x.com/anyuser/status/1718545720481845594) 2023-10-29T08:30Z 87.3K followers, 70.8K engagements "List of links to blog posts write-ups and papers related to cybersecurity reverse engineering and exploitation (constantly updated) #cybersecurity #infosec https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.mdref=0xor0ne.xyz https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.mdref=0xor0ne.xyz" [X Link](https://x.com/anyuser/status/1729168430501130378) 2023-11-27T16:00Z 87.3K followers, 103.9K engagements "Introduction to cryptography concepts for beginners with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ref=0xor0ne.xyz https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ref=0xor0ne.xyz https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ref=0xor0ne.xyz https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ref=0xor0ne.xyz" [X Link](https://x.com/0xor0ne/status/1732090090887766487) 2023-12-05T17:30Z 87.3K followers, 56.4K engagements ""The Linux Kernel Module Programming Guide" Introduction guide to Linux kernel internals and modules development (updated to 5.x kernels) #Linux #kernel #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/" [X Link](https://x.com/0xor0ne/status/1732671539579871273) 2023-12-07T08:01Z 87.3K followers, 52.2K engagements "Call of Duty: Black Ops [--] - Reverse engineering of runtime code integrity protection Writeup by @momo5502 #reverseengineering #infosec https://web.archive.org/web/20230522230748/https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/ https://web.archive.org/web/20230522230748/https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/" [X Link](https://x.com/anyuser/status/1733403626385625346) 2023-12-09T08:30Z 87.3K followers, 47.6K engagements "Beginner intro to cryptography concepts with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/" [X Link](https://x.com/anyuser/status/1755645237358104855) 2024-02-08T17:30Z 87.3K followers, 32.1K engagements "Excellent beginners introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/0xor0ne/status/1770865469899030673) 2024-03-21T17:30Z 87.3K followers, 32.6K engagements "Beginners series for starting with embedded devices reverse engineering Credits @voidstarsec Ghidra setup: Tools: Firmware extraction: #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment" [X Link](https://x.com/anyuser/status/1771575136677659065) 2024-03-23T16:30Z 87.3K followers, 33.5K engagements "Reverse engineering and vulnerability analysis of DJI drones' firmware. A two-parts blog series by @nozominetworks Firmware Analysis: Vulnerability Analysis: Particularly interesting is the chain of weak Wi-Fi password cracking (CVE-2023-6951) followed by the unauthenticated video exfiltration (CVE-2023-6949) #dji #drone https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-1-firmware-analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis" [X Link](https://x.com/0xor0ne/status/1775178741401985462) 2024-04-02T15:09Z 87.3K followers, 43.4K engagements "Must read guide for anyone starting with Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/" [X Link](https://x.com/anyuser/status/1779577886875201737) 2024-04-14T18:30Z 87.3K followers, 43.5K engagements "Nice introduction to Windows kernel exploitation for beginners Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/0xor0ne/status/1785640468178407812) 2024-05-01T12:00Z 87.3K followers, 32.4K engagements "Getting started with embedded devices reverse engineering (Beginners series) Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment" [X Link](https://x.com/0xor0ne/status/1816005412639944715) 2024-07-24T07:00Z 87.3K followers, 23.3K engagements "Get started with Satellite hacking and CTFs Satellite Hacking Demystified: Hack-a-sat writeups: Hack-a-sat players corner: #satellite #cybersecurity https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/satellite-hacking-demystified https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/satellite-hacking-demystified" [X Link](https://x.com/0xor0ne/status/1817100119361060948) 2024-07-27T07:30Z 87.2K followers, 36.7K engagements "Beginners intro to Linux kernel exploitation (env setup and ret2usr) Part 1: Part 2: #Linux #cybersecurity http://scoding.de/linux-kernel-exploitation-buffer_overflow http://scoding.de/linux-kernel-exploitation-environment http://scoding.de/linux-kernel-exploitation-buffer_overflow http://scoding.de/linux-kernel-exploitation-environment" [X Link](https://x.com/anyuser/status/1833400105803637166) 2024-09-10T07:00Z 87.3K followers, 41.5K engagements "Intro to windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/0xor0ne/status/1835347968913821697) 2024-09-15T16:00Z 87.3K followers, 51.2K engagements "Beginners intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment" [X Link](https://x.com/0xor0ne/status/1837514650193105207) 2024-09-21T15:30Z 87.3K followers, 65.3K engagements "Open source Wi-Fi stack for ESP32 SoCs through reverse engineering pre-compiled binary blobs Part 1: Part 2: Repo: #esp32 #cybersecurity https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/" [X Link](https://x.com/0xor0ne/status/1839560629532660084) 2024-09-27T07:00Z 87.3K followers, 38.1K engagements "Introduction to Linux kernel internals and modules development "The Linux Kernel Module Programming Guide" #Linux #infosec https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/" [X Link](https://x.com/0xor0ne/status/1840292943808119249) 2024-09-29T07:30Z 87.3K followers, 34.9K engagements "Intro for beginners to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment" [X Link](https://x.com/anyuser/status/1851172122711773524) 2024-10-29T08:00Z 87.3K followers, 31.7K engagements "Windows kernel exploitation beginners introduction Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/anyuser/status/1851655363474366709) 2024-10-30T16:00Z 87.3K followers, 31.9K engagements "Introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/0xor0ne/status/1860601769539076542) 2024-11-24T08:30Z 87.3K followers, 28.8K engagements "Intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment" [X Link](https://x.com/0xor0ne/status/1871949104974123486) 2024-12-25T16:00Z 87.3K followers, 34.4K engagements "Easy introduction to cryptography concept with practical examples in Linux (openssl) Part 1: Part 2: Part 3: Part 4: Credits @sergioprado #cryptography #infosec https://sergioprado.blog/what-are-random-numbers-and-how-they-are-managed-on-linux/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/what-are-random-numbers-and-how-they-are-managed-on-linux/" [X Link](https://x.com/0xor0ne/status/1874002642474577998) 2024-12-31T08:00Z 87.3K followers, 43.2K engagements "Reverse engineering and malware analysis series Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/" [X Link](https://x.com/anyuser/status/1883560559091540043) 2025-01-26T17:00Z 87.3K followers, 34.3K engagements "Iptables for local privilege escalation #Linux #infosec https://www.shielder.com/blog/2024/09/a-journey-from-sudo-iptables-to-local-privilege-escalation/ https://www.shielder.com/blog/2024/09/a-journey-from-sudo-iptables-to-local-privilege-escalation/" [X Link](https://x.com/anyuser/status/1885727331550945326) 2025-02-01T16:30Z 87.3K followers, 33.3K engagements "Intercepting Linux system calls #cybersecurity #Linux https://blog.mggross.com/intercepting-syscalls/ https://blog.mggross.com/intercepting-syscalls/" [X Link](https://x.com/anyuser/status/1887410940724891734) 2025-02-06T08:00Z 87.3K followers, 29.5K engagements "Nice introduction to Linux kernel rootkits #Linux #infosec https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits" [X Link](https://x.com/anyuser/status/1890800751749853583) 2025-02-15T16:30Z 87.3K followers, 40.4K engagements "Intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment" [X Link](https://x.com/0xor0ne/status/1891887913383670159) 2025-02-18T16:30Z 87.3K followers, 36.7K engagements "Introduction for beginners to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #cybersecurity https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/0xor0ne/status/1902034780964737376) 2025-03-18T16:30Z 87.3K followers, 25.7K engagements "Beginners introduction to Linux kernel rootkits #Linux #cybersecurity https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits" [X Link](https://x.com/anyuser/status/1902389716357673028) 2025-03-19T16:00Z 87.3K followers, 36.2K engagements "Write-ups blog posts and papers related to cybersecurity reverse engineering and exploitation #infosec #cybersecurity https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md" [X Link](https://x.com/0xor0ne/status/1906247545417806163) 2025-03-30T07:30Z 87.3K followers, 32.1K engagements "Short introduction to Linux kernel rootkits #Linux #cybersecurity https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits" [X Link](https://x.com/0xor0ne/status/1913616220739223907) 2025-04-19T15:30Z 87.3K followers, 28.8K engagements "Valve Anti-Cheat (VAC) solution reverse engineering #infosec #reverseengineering https://codeneverdies.github.io/posts/gh-2/ https://codeneverdies.github.io/posts/gh-2/" [X Link](https://x.com/0xor0ne/status/1923763047077732390) 2025-05-17T15:30Z 87.3K followers, 32.7K engagements "Linux kernel rootkits: beginners introduction #Linux #infosec https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits" [X Link](https://x.com/anyuser/status/1924721987181551776) 2025-05-20T07:00Z 87.3K followers, 24.8K engagements "Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras by @Watchful_IP #embedded #cybersecurity https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html" [X Link](https://x.com/anyuser/status/1969793887548961121) 2025-09-21T16:00Z 87.3K followers, 30.5K engagements "APT28s Phantom Net Voxel operation. Technical analysis by @sekoia_io #infosec https://blog.sekoia.io/apt28-operation-phantom-net-voxel/ https://blog.sekoia.io/apt28-operation-phantom-net-voxel/" [X Link](https://x.com/0xor0ne/status/1985618192534786312) 2025-11-04T08:00Z 86.9K followers, [----] engagements "Reverse-engineering and security analysis of Worldline Yomani XR payment terminal devices #embedded #infosec https://stefan-gloor.ch/yomani-hack https://stefan-gloor.ch/yomani-hack" [X Link](https://x.com/0xor0ne/status/1999879542123454513) 2025-12-13T16:30Z 87.1K followers, 13.8K engagements "Bypassing secure boot on Raspberry RP2350 (paper) #infosec #embedded https://www.usenix.org/system/files/woot25-muench.pdf https://www.usenix.org/system/files/woot25-muench.pdf" [X Link](https://x.com/0xor0ne/status/2012933331478864161) 2026-01-18T17:01Z 86.9K followers, 27.2K engagements "Analysis of a race condition vulnerability in Linux POSIX CPU Timer Subsystem (CVE-2025-38352) Credits @streypaws #infosec https://streypaws.github.io/posts/Race-Against-Time-in-the-Kernel-Clockwork/ https://streypaws.github.io/posts/Race-Against-Time-in-the-Kernel-Clockwork/" [X Link](https://x.com/0xor0ne/status/2013280857549689053) 2026-01-19T16:02Z 86.9K followers, [----] engagements "One-click memory corruption in Alibabas UC Browser (@InterruptLabs) #infosec https://interruptlabs.co.uk/articles/one-click-memory-corruption-in-alibabas-uc-browser-exploiting-patch-gap-v8-vulnerabilities-to-steal-your-data https://interruptlabs.co.uk/articles/one-click-memory-corruption-in-alibabas-uc-browser-exploiting-patch-gap-v8-vulnerabilities-to-steal-your-data" [X Link](https://x.com/0xor0ne/status/2013522178872860981) 2026-01-20T08:01Z 87.1K followers, 11.9K engagements "Introduction series on ARM64 reverse engineering and exploitation (@8kSec) #infosec #arm https://8ksec.io/arm-64-reversing-and-exploitation-series/ https://8ksec.io/arm-64-reversing-and-exploitation-series/" [X Link](https://x.com/0xor0ne/status/2014005572245336152) 2026-01-21T16:02Z 87K followers, 20.2K engagements "PoC for CVE-2025-38352: race condition vulnerability in the Linux kernel's POSIX CPU timers implementation (@farazsth98) Part 1: Part 2: #infosec https://faith2dxy.xyz/2025-12-24/cve_2025_38352_analysis_part_2/ https://faith2dxy.xyz/2025-12-22/cve_2025_38352_analysis/ https://faith2dxy.xyz/2025-12-24/cve_2025_38352_analysis_part_2/ https://faith2dxy.xyz/2025-12-22/cve_2025_38352_analysis/" [X Link](https://x.com/0xor0ne/status/2014246848140112190) 2026-01-22T08:00Z 87.1K followers, 10.5K engagements "Reverse engineering and security analysis of an ESP32 based IoT device [----] blog post by @jmswrnr #esp32 #cybersecurity https://jmswrnr.com/blog/hacking-a-smart-home-device https://jmswrnr.com/blog/hacking-a-smart-home-device" [X Link](https://x.com/0xor0ne/status/2014609273246843294) 2026-01-23T08:00Z 87.1K followers, 17.5K engagements "Exploiting the Synology BeeStation Plus (BST170-8T) (Pwn2Own Ireland 2025) Credits @Tek_7987 and @_Anyfun (@Synacktiv) #infosec https://www.synacktiv.com/en/publications/breaking-the-beestation-inside-our-pwn2own-2025-exploit-journey https://www.synacktiv.com/en/publications/breaking-the-beestation-inside-our-pwn2own-2025-exploit-journey" [X Link](https://x.com/0xor0ne/status/2014730318612197776) 2026-01-23T16:01Z 86.9K followers, [----] engagements "Zyxel DX3301-T0/EX3301-T0 Router Post Auth Vulnerability for root shell by @Watchful_IP #embedded #infosec https://watchfulip.github.io/28-12-25/zyxel.html https://watchfulip.github.io/28-12-25/zyxel.html" [X Link](https://x.com/0xor0ne/status/2015099808940257750) 2026-01-24T16:30Z 87K followers, [----] engagements "Bruteforcing ECC and dumping firmware from a Potensic Atom [--] drone Research by @Neodyme #infosec https://neodyme.io/en/blog/drone_hacking_part_1/#intro https://neodyme.io/en/blog/drone_hacking_part_1/#intro" [X Link](https://x.com/0xor0ne/status/2015469917831618977) 2026-01-25T17:00Z 87.1K followers, 11.1K engagements "LogPoint re-auth RCE due to Nginx misconfigs hardcoded secrets and a reachable eval() (@mdisec) #infosec https://mehmetince.net/the-story-of-a-perfect-exploit-chain-six-bugs-that-looked-harmless-until-they-became-pre-auth-rce-in-a-security-appliance/ https://mehmetince.net/the-story-of-a-perfect-exploit-chain-six-bugs-that-looked-harmless-until-they-became-pre-auth-rce-in-a-security-appliance/" [X Link](https://x.com/0xor0ne/status/2015817480262852860) 2026-01-26T16:01Z 86.9K followers, [----] engagements "Reverse engineering and dumping firmware from a low-cost smartwatch by Damien Cauquil (@quarkslab) #infosec https://blog.quarkslab.com/modern-tale-blinkenlights.html https://blog.quarkslab.com/modern-tale-blinkenlights.html" [X Link](https://x.com/0xor0ne/status/2017145953950585282) 2026-01-30T08:00Z 87.1K followers, 18.5K engagements "Intro series to Linux kernel exploitation by @k3170Makan Debugging with QEMU: Stack Overflows: RIP control: #Linux #kernel #exploit #infosec #cybersecurity https://blog.k3170makan.com/2021/01/linux-kernel-exploitation-0x2.html http://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x0-debugging.html https://blog.k3170makan.com/2021/01/linux-kernel-exploitation-0x2.html http://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html" [X Link](https://x.com/0xor0ne/status/1607647540098306049) 2022-12-27T08:00Z 87.4K followers, 92K engagements "Good series for learning the ELF format internals (credits @IntezerLabs) Part 1: Part 2: Part 3: Part 4: #elf #Linux #unix #infotech #learning #beginner https://www.intezer.com/blog/malware-analysis/executable-linkable-format-101-part-4-dynamic-linking/ https://www.intezer.com/blog/malware-analysis/executable-and-linkable-format-101-part-3-relocations/ https://www.intezer.com/blog/malware-analysis/executable-linkable-format-101-part-2-symbols/ https://www.intezer.com/blog/research/executable-linkable-format-101-part1-sections-segments/" [X Link](https://x.com/0xor0ne/status/1614540402924609537) 2023-01-15T08:30Z 87.3K followers, 60.6K engagements "Nice collection of material for getting started with reverse engineering and Ghidra (University of Cincinnati Malware Analysis Class) #reverseengineering #infoserc #cybersecurity #learning #beginner https://class.malware.re/ https://class.malware.re/" [X Link](https://x.com/0xor0ne/status/1623294336170397698) 2023-02-08T12:15Z 87.3K followers, 48.4K engagements "Introduction to Linux kernel exploitation Series by @k3170Makan Debugging with QEMU: Stack Overflows: RIP control: #Linux #kernel #exploit #infosec #cybersecurity https://blog.k3170makan.com/2021/01/linux-kernel-exploitation-0x2.html http://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x0-debugging.html https://blog.k3170makan.com/2021/01/linux-kernel-exploitation-0x2.html http://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html" [X Link](https://x.com/0xor0ne/status/1624098498739154945) 2023-02-10T17:30Z 87.4K followers, 41.2K engagements "Intro to malware reverse engineering Part 1: Part 2: Series by @IntezerLabs #malware #cybersecurity https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/" [X Link](https://x.com/0xor0ne/status/1842588090520453296) 2024-10-05T15:30Z 87.3K followers, 36.3K engagements "Collection of write-ups blog posts and papers related to cybersecurity reverse engineering and exploitation #infosec #cybersecurity https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md" [X Link](https://x.com/0xor0ne/status/1842829665481748982) 2024-10-06T07:30Z 87.3K followers, 34K engagements "Reverse engineering and malware analysis (introduction for beginners) Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/" [X Link](https://x.com/0xor0ne/status/1903484335254098352) 2025-03-22T16:30Z 87.3K followers, 39.4K engagements "Introdution for beginners to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment" [X Link](https://x.com/0xor0ne/status/1903725926963368003) 2025-03-23T08:30Z 87.3K followers, 36.2K engagements "Reverse engineering and security analysis of an ESP32 based IoT device Blog post by James Warner (@jmswrnr) #esp32 #infosec https://jmswrnr.com/blog/hacking-a-smart-home-device https://jmswrnr.com/blog/hacking-a-smart-home-device" [X Link](https://x.com/0xor0ne/status/1911321038341784041) 2025-04-13T07:30Z 87.3K followers, 23.7K engagements "Windows kernel exploitation for beginners Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/0xor0ne/status/1936446621140545945) 2025-06-21T15:30Z 87.4K followers, 45.2K engagements Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
@0xor0ne 0xor0ne0xor0ne posts on X about credits, engineering, reverse, windows the most. They currently have [------] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours.
Social category influence technology brands 9.91% stocks 1.8% countries 1.8% gaming 0.9%
Social topic influence credits 23.42%, engineering #2221, reverse #433, windows 5.41%, tools #1799, tplink #2, stack 2.7%, blog 2.7%, module #95, posts #492
Top accounts mentioned or mentioned by @transilienceai @voidstarsec @sergioprado @intezerlabs @watchfulip @quarkslab @palantir555 @limitedresults @binarlyio @jmswrnr @k3170makan @cybernews_alert @codewhitesec @matheusgarbelin @brk0v @qkaiser @hyprdude @r0rt1z2 @0xtrikkss @bcreusillet
Top assets mentioned Alphabet Inc Class A (GOOGL)
Top posts by engagements in the last [--] hours
"Unauthenticated RCE in NetSupport Manager by chaining CVE-2025-34164 (heap OOB write) and CVE-2025-34165 (stack OOB read) Credits Fabian Weber (@codewhitesec) #infosec https://code-white.com/blog/2026-01-nsm-rce/ https://code-white.com/blog/2026-01-nsm-rce/"
X Link 2026-02-08T17:00Z 87.4K followers, [----] engagements
"If you're interested in bluetooth low level hacking take a look at this cool project by Matheus Eduardo Garbelini (@MatheusGarbelin) Active Bluetooth BR/EDR Sniffer/Injector: #bluetooth #esp32 #espressif #hacking #infosec https://github.com/Matheus-Garbelini/esp32_bluetooth_classic_sniffer https://github.com/Matheus-Garbelini/esp32_bluetooth_classic_sniffer"
X Link 2022-12-23T17:30Z 87.3K followers, 78.6K engagements
"Good refresh series on Linux basics by @brk0v Files pipes processes etc. Prologue: Files: Pipes: Processes: Pseudoterminals: #Linux #learning https://biriukov.dev/docs/fd-pipe-session-terminal/4-terminals-and-pseudoterminals/ https://biriukov.dev/docs/fd-pipe-session-terminal/3-process-groups-jobs-and-sessions/ https://biriukov.dev/docs/fd-pipe-session-terminal/2-pipes/ https://biriukov.dev/docs/fd-pipe-session-terminal/1-file-descriptor-and-open-file-description/"
X Link 2023-01-20T20:30Z 87.3K followers, 61.1K engagements
"Reverse engineering and pwning a Google Home Mini smart speaker. Great blog post for anyone interested in embedded device security. #iot #embedded #infsec #cybersecurity https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html"
X Link 2023-02-01T08:00Z 87.3K followers, 56.6K engagements
"Very useful guide for learning Make (and Makefiles) #make #makefile #infosec #cybersecurity https://makefiletutorial.com https://makefiletutorial.com"
X Link 2023-06-18T18:30Z 87.3K followers, 111.6K engagements
"Introduction guide to Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2023-10-12T19:30Z 87.3K followers, 88K engagements
"Excellent research on reverse engineering and pwning a Google Home Mini smart speaker. A must read if you are interested in embedded device security and vulnerability research. #iot #embedded #infosec #cybersecurity https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html"
X Link 2023-10-24T11:15Z 87.3K followers, 54.8K engagements
"Introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #cybersecurity https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2025-02-02T17:00Z 87.3K followers, 40.8K engagements
"Valve Anti-Cheat (VAC) reverse engineering #infosec https://codeneverdies.github.io/posts/gh-2/ https://codeneverdies.github.io/posts/gh-2/"
X Link 2025-09-27T15:30Z 87.3K followers, 48.8K engagements
"TP-Link Tapo C200 reverse engineering and exploitation Credits @qkaiser #infosec #embedded https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/ https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/"
X Link 2026-01-27T16:30Z 87.2K followers, 29.9K engagements
"Exploiting vulnerabilities in MediaTek MT76xx and MT7915 Wifi chipset family Credits @hyprdude #infosec https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html"
X Link 2026-01-29T08:00Z 87.2K followers, 12.8K engagements
"Heap overflow in MediaTek's DA2 USB file download handler that gives code execution on (Carbonara) patched V6 devices Research by @r0rt1z2 and shomy #infosec https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/ https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/"
X Link 2026-01-31T16:30Z 87.3K followers, [----] engagements
"Clang Hardening Cheat Sheet (2026) Credits @0xTRIKKSS and @bcreusillet (@quarkslab) #infosec https://blog.quarkslab.com/clang-hardening-cheat-sheet-ten-years-later.html https://blog.quarkslab.com/clang-hardening-cheat-sheet-ten-years-later.html"
X Link 2026-02-01T17:01Z 87.3K followers, [----] engagements
"Beginners intro to Linux kernel fuzzing and vulnerability research (2024 blog post series by @slava_moskvin_) Part 1: Part 2: Part 3: #Linux #cybersecurity https://slavamoskvin.com/finding-bugs-in-kernel.-part-2-fuzzing-the-actual-kernel/ https://slavamoskvin.com/finding-bugs-in-kernel.-part-1-crashing-a-vulnerable-driver-with-syzkaller/ https://slavamoskvin.com/hunting-bugs-in-linux-kernel-with-kasan-how-to-use-it-whats-the-benefit/ https://slavamoskvin.com/finding-bugs-in-kernel.-part-2-fuzzing-the-actual-kernel/"
X Link 2026-02-05T16:01Z 87.3K followers, [----] engagements
"Cool series to learn IoT/embedded devices reverse engineering (credits @Palantir555) Debug Ports: Firmware: Data: Flash: Digging the Firmware: #iot https://buff.ly/3WUY50u https://buff.ly/3WKnhay https://buff.ly/3WRz5r4 https://buff.ly/3WHNOFo https://buff.ly/3WGw513 https://buff.ly/3WUY50u https://buff.ly/3WKnhay https://buff.ly/3WRz5r4 https://buff.ly/3WHNOFo https://buff.ly/3WGw513"
X Link 2023-06-27T11:15Z 87.3K followers, 63.4K engagements
"Great free guide for learninig Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2023-08-12T18:30Z 87.3K followers, 65.7K engagements
"If you are a beginner and interested in malware analysis this is an excellent introduction series by @IntezerLabs Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2024-01-13T19:30Z 87.3K followers, 46K engagements
"Interesting project attempting to reverse engineering the precompiled Wi-Fi stack of ESP32 SoC to recreate an open source version Part 1: Part 2: Repo: #esp32 #infosec https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/"
X Link 2024-03-03T08:30Z 87.3K followers, 33.6K engagements
"Reverse engineering of ESP32's precompiled Wi-Fi stack Part 1: Part 2: Repo: #esp32 #cybersecurity https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/"
X Link 2024-08-10T07:30Z 87.3K followers, 39.9K engagements
"Command & Conquer: network architecture exposed attack surface discovered vulnerabilities and exploitation Research by Bryan Alexander and Jordan Whitehead #infosec https://www.atredis.com/blog/2026/1/26/generals https://www.atredis.com/blog/2026/1/26/generals"
X Link 2026-02-07T16:30Z 87.3K followers, [----] engagements
"Cybersecurity related awesome list: blog posts write-ups papers and tools related to cybersecurity reverse engineering and exploitation #cybersecurity #infosec https://github.com/0xor0ne/awesome-list https://github.com/0xor0ne/awesome-list"
X Link 2025-05-29T12:03Z 87.4K followers, 52.9K engagements
"Escalate privileges from a rooted user space (N-EL0) to the highest privilege level in the Secure World (S-EL3) (Android Xiaomi Redmi 11s) (CCC 2025) #infosec https://media.ccc.de/v/39c3-not-to-be-trusted-a-fiasco-in-android-tees https://media.ccc.de/v/39c3-not-to-be-trusted-a-fiasco-in-android-tees"
X Link 2026-02-10T16:30Z 87.4K followers, [----] engagements
"Great 3-parts series on 0-click exploit chain targeting Android Pixel [--] Arbitrary code execution in mediacodec - kernel privilege escalation Part 1: Part 2: Part 3: Research by Natalie Silvanovich (@natashenka) and Seth Jenkins (@__sethJenkins) #infosec https://projectzero.google/2026/01/pixel-0-click-part-3.html https://projectzero.google/2026/01/pixel-0-click-part-2.html https://projectzero.google/2026/01/pixel-0-click-part-1.html https://projectzero.google/2026/01/pixel-0-click-part-3.html https://projectzero.google/2026/01/pixel-0-click-part-2.html"
X Link 2026-02-11T16:18Z 87.4K followers, [----] engagements
"Deep-dive by @landaire into reverse engineering Splinter Cell's (2002) .lin Unreal Engine [--] archive format #ReverseEngineering https://landaire.net/a-file-format-uncracked-for-20-years/ https://landaire.net/a-file-format-uncracked-for-20-years/"
X Link 2026-02-12T08:01Z 87.4K followers, [----] engagements
"Authenticated RCE on TP-Link AX10 & AX1500 through CWMP exploitation (CVE-2025-9961) #infosec https://blog.byteray.co.uk/exploiting-zero-day-cve-2025-9961-in-the-tp-link-ax10-router-8745f9af9c46 https://blog.byteray.co.uk/exploiting-zero-day-cve-2025-9961-in-the-tp-link-ax10-router-8745f9af9c46"
X Link 2026-02-14T16:30Z 87.4K followers, 60.5K engagements
"Very cool repo for learning how to use rust for offensive security https://github.com/trickster0/OffensiveRust https://github.com/trickster0/OffensiveRust"
X Link 2022-12-19T17:30Z 87.4K followers, 45.7K engagements
"Cool secure boot bypass by fault injection in ESP32 CPUs by @LimitedResults #embedded #iot #hardware #faultinjection #infosec https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/ https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/"
X Link 2023-01-03T17:30Z 87.4K followers, 69.3K engagements
"Just a reminder of a few great tools for firmware unpacking repacking and analysis binwalk: EMBA: unblob: ofrak: #iot #embedded #reverseengineering #infosec https://github.com/redballoonsecurity/ofrak https://github.com/onekey-sec/unblob https://github.com/e-m-b-a/emba https://github.com/ReFirmLabs/binwalk https://github.com/redballoonsecurity/ofrak https://github.com/onekey-sec/unblob https://github.com/e-m-b-a/emba https://github.com/ReFirmLabs/binwalk"
X Link 2023-01-28T08:30Z 87.4K followers, 95K engagements
"Nice series introducing cryptography concepts for beginners (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"
X Link 2023-04-22T18:30Z 87.3K followers, 73.6K engagements
"Nice intro for beginners to bluetooth communications reverse engineering (Domyos EL500) Credits @Palantir555 #bluetooth https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/ https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/"
X Link 2023-05-13T18:30Z 87.4K followers, 58.5K engagements
"Secure boot bypass by fault injection in (Espressif) ESP32 CPUs Credits @LimitedResults #embedded #iot #hardware #faultinjection #infosec https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/ https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/"
X Link 2023-05-28T07:30Z 87.4K followers, 65K engagements
"Excellent free book for anyone interested in Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2023-06-09T16:30Z 87.4K followers, 227.8K engagements
"MikroTik routers reverse engineering and exploitation Excellent work by @hgarrereyn and @__comedian Blog post: Slides (RECon): #iot #mikrotik #cybsersecurity https://github.com/MarginResearch/resources/blob/83e402a86370f7c3acf8bb3ad982c1fee89c9b53/documents/Pulling_MikroTik_into_the_Limelight.pdf https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/ https://github.com/MarginResearch/resources/blob/83e402a86370f7c3acf8bb3ad982c1fee89c9b53/documents/Pulling_MikroTik_into_the_Limelight.pdf https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/"
X Link 2023-12-03T08:30Z 87.4K followers, 56.7K engagements
"Introduction to reverse engineering and malware analysis Part 1: Part 2: #malware #cybersecurity https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2025-02-16T08:30Z 87.3K followers, 36.6K engagements
"TP-Link (Tapo) C210 cloud camera: bootloader vulnerability and firmware decryption by @Watchful_IP #infosec https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html"
X Link 2026-02-02T16:03Z 87.4K followers, 15.2K engagements
""DIRTYFREE: Simplified Data-Oriented Programming in the Linux Kernel" (paper) Authors: Yoochan Lee Hyuk Kwon and Thorsten Holz #infosec #Linux https://leeyoochan.github.io/assets/pdf/DirtyFree_NDSS_2026.pdf https://leeyoochan.github.io/assets/pdf/DirtyFree_NDSS_2026.pdf"
X Link 2026-02-03T16:30Z 87.3K followers, [----] engagements
"CVE-2025-3052 explained: running unsigned code during the UEFI boot process Credits @binarly_io #infosec https://www.binarly.io/blog/another-crack-in-the-chain-of-trust https://www.binarly.io/blog/another-crack-in-the-chain-of-trust"
X Link 2026-02-06T16:01Z 87.3K followers, [----] engagements
""From Zero to QEMU: A journey into system emulation" (slide deck by Antonio Nappa) #infosec #qemu https://docs.google.com/presentation/d/1g0hTGKXWf6EvyUIjw4qomJ5CGrV245nbGn5p-yNu1Sc/editslide=id.g357295fe39c_0_3#slide=id.g357295fe39c_0_3 https://docs.google.com/presentation/d/1g0hTGKXWf6EvyUIjw4qomJ5CGrV245nbGn5p-yNu1Sc/editslide=id.g357295fe39c_0_3#slide=id.g357295fe39c_0_3"
X Link 2026-02-03T08:01Z 87.4K followers, 28.8K engagements
"Reverse engineering Realtek RTL8761B* Bluetooth chips to make better Bluetooth security tools & classes (slide deck by @XenoKovah) #infosec https://darkmentor.com/publication/2025-11-hardweario/ https://darkmentor.com/publication/2025-11-hardweario/"
X Link 2026-02-05T08:00Z 87.4K followers, 14.4K engagements
"Deep dive into how Windows on ARM handles interrupts by Connor McGarr (@33y0re) #Windows #infosec https://connormcgarr.github.io/windows-arm64-interrupts/ https://connormcgarr.github.io/windows-arm64-interrupts/"
X Link 2026-02-06T08:00Z 87.4K followers, [----] engagements
"TP-Link Tapo C200 IP camera: security analysis and exploitation by @evilsocket #infosec #iot https://www.evilsocket.net/2025/12/18/TP-Link-Tapo-C200-Hardcoded-Keys-Buffer-Overflows-and-Privacy-in-the-Era-of-AI-Assisted-Reverse-Engineering/ https://www.evilsocket.net/2025/12/18/TP-Link-Tapo-C200-Hardcoded-Keys-Buffer-Overflows-and-Privacy-in-the-Era-of-AI-Assisted-Reverse-Engineering/"
X Link 2026-01-15T08:00Z 87.4K followers, 142.6K engagements
"Airoha Bluetooth RACE vulnerabilities (CVE-2025-20700/20701/20702) Blog post: White paper: Credits Dennis Heinze Frieder Steinmetz (@ERNW_ITSec) #infosec #bluetooth https://static.ernw.de/whitepaper/ERNW_White_Paper_74_1.0.pdf https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/ https://static.ernw.de/whitepaper/ERNW_White_Paper_74_1.0.pdf https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/"
X Link 2026-02-04T16:02Z 87.4K followers, [----] engagements
"Short beginners introduction to virtual memory #cybersecurity https://nghiant3223.github.io/2025/05/29/fundamental_of_virtual_memory.html https://nghiant3223.github.io/2025/05/29/fundamental_of_virtual_memory.html"
X Link 2026-02-09T16:01Z 87.4K followers, [----] engagements
"Exploiting Linux by abusing page table entries #Linux #infosec https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326 https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326"
X Link 2026-02-10T08:00Z 87.4K followers, 11.1K engagements
"Dirty Pageflags: abusing page table entries for exploiting Linux #Linux #infosec https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326 https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326"
X Link 2026-02-12T16:02Z 87.4K followers, [----] engagements
"MediaTek exploit that lets you write to arbitrary memory via the Download Agent bypassing DA2 signature verification Blog post by @shomykohai #infosec https://shomy.is-a.dev/blog/article/serving-carbonara https://shomy.is-a.dev/blog/article/serving-carbonara"
X Link 2026-02-13T08:00Z 87.4K followers, [----] engagements
"Cybersecurity blog posts writeups papers and tools #infosec https://github.com/0xor0ne/awesome-list https://github.com/0xor0ne/awesome-list"
X Link 2026-02-13T16:02Z 87.4K followers, 26.5K engagements
"Three-part series by @binarly_io on Supermicro BMC firmware authentication bypasses Part 1: Part 2: Part 3: #infosec https://www.binarly.io/blog/have-you-patched-are-you-sure-the-story-of-the-sticky-supermicro-bmc-bugs https://www.binarly.io/blog/broken-trust-fixed-supermicro-bmc-bug-gains-a-new-life-in-two-new-vulnerabilities https://www.binarly.io/blog/ghost-in-the-controller-abusing-supermicro-bmc-firmware-verification https://www.binarly.io/blog/have-you-patched-are-you-sure-the-story-of-the-sticky-supermicro-bmc-bugs"
X Link 2026-02-15T17:00Z 87.4K followers, [----] engagements
"Here are a few resources for getting started with Satellite hacking and CTFs Satellite Hacking Demystified: Hack-a-sat writeups: Hack-a-sat players corner: #satellite #infosec https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/Satellite-Hacking-Demystified/ https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/Satellite-Hacking-Demystified/"
X Link 2023-08-09T07:00Z 87.3K followers, 60.7K engagements
"Excellent introduction to cryptography concepts for beginners with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"
X Link 2023-08-14T08:01Z 87.3K followers, 84.8K engagements
"Interesting series on how virtualization works (VMware XEN QEMU) Credits @LordNoteworthy Part 1: Part 2: Part 3: Part 4: #virtualization #infotech https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu https://docs.saferwall.com/blog/virtualization-internals-part-3-xen-and-paravirtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/ https://docs.saferwall.com/blog/virtualization-internals-part-1-intro-to-virtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu"
X Link 2023-09-06T18:00Z 87.3K followers, 63.6K engagements
"Beginner introduction to cryptography concepts with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"
X Link 2023-10-10T07:00Z 87.3K followers, 87.2K engagements
"Windows rootkit development for red teaming Excellent series by @Idov31 Part 1: Part 2: Part 3: Part 4: PArt 5: #windows #driver #kernel #rootkit #redteam https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html"
X Link 2023-10-19T19:30Z 87.3K followers, 61.4K engagements
"Reverse engineering the Brightway (Xiaomi) scooters Interesting blog post for anyone interested in embedded devices reverse engineering #reverseengineering #cybersecurity #infotech https://robocoffee.de/p=436 https://robocoffee.de/p=436"
X Link 2023-10-29T08:30Z 87.3K followers, 70.8K engagements
"List of links to blog posts write-ups and papers related to cybersecurity reverse engineering and exploitation (constantly updated) #cybersecurity #infosec https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.mdref=0xor0ne.xyz https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.mdref=0xor0ne.xyz"
X Link 2023-11-27T16:00Z 87.3K followers, 103.9K engagements
"Introduction to cryptography concepts for beginners with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ref=0xor0ne.xyz https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ref=0xor0ne.xyz https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ref=0xor0ne.xyz https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ref=0xor0ne.xyz"
X Link 2023-12-05T17:30Z 87.3K followers, 56.4K engagements
""The Linux Kernel Module Programming Guide" Introduction guide to Linux kernel internals and modules development (updated to 5.x kernels) #Linux #kernel #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2023-12-07T08:01Z 87.3K followers, 52.2K engagements
"Call of Duty: Black Ops [--] - Reverse engineering of runtime code integrity protection Writeup by @momo5502 #reverseengineering #infosec https://web.archive.org/web/20230522230748/https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/ https://web.archive.org/web/20230522230748/https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/"
X Link 2023-12-09T08:30Z 87.3K followers, 47.6K engagements
"Beginner intro to cryptography concepts with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"
X Link 2024-02-08T17:30Z 87.3K followers, 32.1K engagements
"Excellent beginners introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-03-21T17:30Z 87.3K followers, 32.6K engagements
"Beginners series for starting with embedded devices reverse engineering Credits @voidstarsec Ghidra setup: Tools: Firmware extraction: #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-03-23T16:30Z 87.3K followers, 33.5K engagements
"Reverse engineering and vulnerability analysis of DJI drones' firmware. A two-parts blog series by @nozominetworks Firmware Analysis: Vulnerability Analysis: Particularly interesting is the chain of weak Wi-Fi password cracking (CVE-2023-6951) followed by the unauthenticated video exfiltration (CVE-2023-6949) #dji #drone https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-1-firmware-analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis"
X Link 2024-04-02T15:09Z 87.3K followers, 43.4K engagements
"Must read guide for anyone starting with Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2024-04-14T18:30Z 87.3K followers, 43.5K engagements
"Nice introduction to Windows kernel exploitation for beginners Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-05-01T12:00Z 87.3K followers, 32.4K engagements
"Getting started with embedded devices reverse engineering (Beginners series) Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-07-24T07:00Z 87.3K followers, 23.3K engagements
"Get started with Satellite hacking and CTFs Satellite Hacking Demystified: Hack-a-sat writeups: Hack-a-sat players corner: #satellite #cybersecurity https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/satellite-hacking-demystified https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/satellite-hacking-demystified"
X Link 2024-07-27T07:30Z 87.2K followers, 36.7K engagements
"Beginners intro to Linux kernel exploitation (env setup and ret2usr) Part 1: Part 2: #Linux #cybersecurity http://scoding.de/linux-kernel-exploitation-buffer_overflow http://scoding.de/linux-kernel-exploitation-environment http://scoding.de/linux-kernel-exploitation-buffer_overflow http://scoding.de/linux-kernel-exploitation-environment"
X Link 2024-09-10T07:00Z 87.3K followers, 41.5K engagements
"Intro to windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-09-15T16:00Z 87.3K followers, 51.2K engagements
"Beginners intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-09-21T15:30Z 87.3K followers, 65.3K engagements
"Open source Wi-Fi stack for ESP32 SoCs through reverse engineering pre-compiled binary blobs Part 1: Part 2: Repo: #esp32 #cybersecurity https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/"
X Link 2024-09-27T07:00Z 87.3K followers, 38.1K engagements
"Introduction to Linux kernel internals and modules development "The Linux Kernel Module Programming Guide" #Linux #infosec https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2024-09-29T07:30Z 87.3K followers, 34.9K engagements
"Intro for beginners to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-10-29T08:00Z 87.3K followers, 31.7K engagements
"Windows kernel exploitation beginners introduction Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-10-30T16:00Z 87.3K followers, 31.9K engagements
"Introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-11-24T08:30Z 87.3K followers, 28.8K engagements
"Intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-12-25T16:00Z 87.3K followers, 34.4K engagements
"Easy introduction to cryptography concept with practical examples in Linux (openssl) Part 1: Part 2: Part 3: Part 4: Credits @sergioprado #cryptography #infosec https://sergioprado.blog/what-are-random-numbers-and-how-they-are-managed-on-linux/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/what-are-random-numbers-and-how-they-are-managed-on-linux/"
X Link 2024-12-31T08:00Z 87.3K followers, 43.2K engagements
"Reverse engineering and malware analysis series Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2025-01-26T17:00Z 87.3K followers, 34.3K engagements
"Iptables for local privilege escalation #Linux #infosec https://www.shielder.com/blog/2024/09/a-journey-from-sudo-iptables-to-local-privilege-escalation/ https://www.shielder.com/blog/2024/09/a-journey-from-sudo-iptables-to-local-privilege-escalation/"
X Link 2025-02-01T16:30Z 87.3K followers, 33.3K engagements
"Intercepting Linux system calls #cybersecurity #Linux https://blog.mggross.com/intercepting-syscalls/ https://blog.mggross.com/intercepting-syscalls/"
X Link 2025-02-06T08:00Z 87.3K followers, 29.5K engagements
"Nice introduction to Linux kernel rootkits #Linux #infosec https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"
X Link 2025-02-15T16:30Z 87.3K followers, 40.4K engagements
"Intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2025-02-18T16:30Z 87.3K followers, 36.7K engagements
"Introduction for beginners to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #cybersecurity https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2025-03-18T16:30Z 87.3K followers, 25.7K engagements
"Beginners introduction to Linux kernel rootkits #Linux #cybersecurity https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"
X Link 2025-03-19T16:00Z 87.3K followers, 36.2K engagements
"Write-ups blog posts and papers related to cybersecurity reverse engineering and exploitation #infosec #cybersecurity https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md"
X Link 2025-03-30T07:30Z 87.3K followers, 32.1K engagements
"Short introduction to Linux kernel rootkits #Linux #cybersecurity https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"
X Link 2025-04-19T15:30Z 87.3K followers, 28.8K engagements
"Valve Anti-Cheat (VAC) solution reverse engineering #infosec #reverseengineering https://codeneverdies.github.io/posts/gh-2/ https://codeneverdies.github.io/posts/gh-2/"
X Link 2025-05-17T15:30Z 87.3K followers, 32.7K engagements
"Linux kernel rootkits: beginners introduction #Linux #infosec https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"
X Link 2025-05-20T07:00Z 87.3K followers, 24.8K engagements
"Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras by @Watchful_IP #embedded #cybersecurity https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html"
X Link 2025-09-21T16:00Z 87.3K followers, 30.5K engagements
"APT28s Phantom Net Voxel operation. Technical analysis by @sekoia_io #infosec https://blog.sekoia.io/apt28-operation-phantom-net-voxel/ https://blog.sekoia.io/apt28-operation-phantom-net-voxel/"
X Link 2025-11-04T08:00Z 86.9K followers, [----] engagements
"Reverse-engineering and security analysis of Worldline Yomani XR payment terminal devices #embedded #infosec https://stefan-gloor.ch/yomani-hack https://stefan-gloor.ch/yomani-hack"
X Link 2025-12-13T16:30Z 87.1K followers, 13.8K engagements
"Bypassing secure boot on Raspberry RP2350 (paper) #infosec #embedded https://www.usenix.org/system/files/woot25-muench.pdf https://www.usenix.org/system/files/woot25-muench.pdf"
X Link 2026-01-18T17:01Z 86.9K followers, 27.2K engagements
"Analysis of a race condition vulnerability in Linux POSIX CPU Timer Subsystem (CVE-2025-38352) Credits @streypaws #infosec https://streypaws.github.io/posts/Race-Against-Time-in-the-Kernel-Clockwork/ https://streypaws.github.io/posts/Race-Against-Time-in-the-Kernel-Clockwork/"
X Link 2026-01-19T16:02Z 86.9K followers, [----] engagements
"One-click memory corruption in Alibabas UC Browser (@InterruptLabs) #infosec https://interruptlabs.co.uk/articles/one-click-memory-corruption-in-alibabas-uc-browser-exploiting-patch-gap-v8-vulnerabilities-to-steal-your-data https://interruptlabs.co.uk/articles/one-click-memory-corruption-in-alibabas-uc-browser-exploiting-patch-gap-v8-vulnerabilities-to-steal-your-data"
X Link 2026-01-20T08:01Z 87.1K followers, 11.9K engagements
"Introduction series on ARM64 reverse engineering and exploitation (@8kSec) #infosec #arm https://8ksec.io/arm-64-reversing-and-exploitation-series/ https://8ksec.io/arm-64-reversing-and-exploitation-series/"
X Link 2026-01-21T16:02Z 87K followers, 20.2K engagements
"PoC for CVE-2025-38352: race condition vulnerability in the Linux kernel's POSIX CPU timers implementation (@farazsth98) Part 1: Part 2: #infosec https://faith2dxy.xyz/2025-12-24/cve_2025_38352_analysis_part_2/ https://faith2dxy.xyz/2025-12-22/cve_2025_38352_analysis/ https://faith2dxy.xyz/2025-12-24/cve_2025_38352_analysis_part_2/ https://faith2dxy.xyz/2025-12-22/cve_2025_38352_analysis/"
X Link 2026-01-22T08:00Z 87.1K followers, 10.5K engagements
"Reverse engineering and security analysis of an ESP32 based IoT device [----] blog post by @jmswrnr #esp32 #cybersecurity https://jmswrnr.com/blog/hacking-a-smart-home-device https://jmswrnr.com/blog/hacking-a-smart-home-device"
X Link 2026-01-23T08:00Z 87.1K followers, 17.5K engagements
"Exploiting the Synology BeeStation Plus (BST170-8T) (Pwn2Own Ireland 2025) Credits @Tek_7987 and @_Anyfun (@Synacktiv) #infosec https://www.synacktiv.com/en/publications/breaking-the-beestation-inside-our-pwn2own-2025-exploit-journey https://www.synacktiv.com/en/publications/breaking-the-beestation-inside-our-pwn2own-2025-exploit-journey"
X Link 2026-01-23T16:01Z 86.9K followers, [----] engagements
"Zyxel DX3301-T0/EX3301-T0 Router Post Auth Vulnerability for root shell by @Watchful_IP #embedded #infosec https://watchfulip.github.io/28-12-25/zyxel.html https://watchfulip.github.io/28-12-25/zyxel.html"
X Link 2026-01-24T16:30Z 87K followers, [----] engagements
"Bruteforcing ECC and dumping firmware from a Potensic Atom [--] drone Research by @Neodyme #infosec https://neodyme.io/en/blog/drone_hacking_part_1/#intro https://neodyme.io/en/blog/drone_hacking_part_1/#intro"
X Link 2026-01-25T17:00Z 87.1K followers, 11.1K engagements
"LogPoint re-auth RCE due to Nginx misconfigs hardcoded secrets and a reachable eval() (@mdisec) #infosec https://mehmetince.net/the-story-of-a-perfect-exploit-chain-six-bugs-that-looked-harmless-until-they-became-pre-auth-rce-in-a-security-appliance/ https://mehmetince.net/the-story-of-a-perfect-exploit-chain-six-bugs-that-looked-harmless-until-they-became-pre-auth-rce-in-a-security-appliance/"
X Link 2026-01-26T16:01Z 86.9K followers, [----] engagements
"Reverse engineering and dumping firmware from a low-cost smartwatch by Damien Cauquil (@quarkslab) #infosec https://blog.quarkslab.com/modern-tale-blinkenlights.html https://blog.quarkslab.com/modern-tale-blinkenlights.html"
X Link 2026-01-30T08:00Z 87.1K followers, 18.5K engagements
"Intro series to Linux kernel exploitation by @k3170Makan Debugging with QEMU: Stack Overflows: RIP control: #Linux #kernel #exploit #infosec #cybersecurity https://blog.k3170makan.com/2021/01/linux-kernel-exploitation-0x2.html http://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x0-debugging.html https://blog.k3170makan.com/2021/01/linux-kernel-exploitation-0x2.html http://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html"
X Link 2022-12-27T08:00Z 87.4K followers, 92K engagements
"Good series for learning the ELF format internals (credits @IntezerLabs) Part 1: Part 2: Part 3: Part 4: #elf #Linux #unix #infotech #learning #beginner https://www.intezer.com/blog/malware-analysis/executable-linkable-format-101-part-4-dynamic-linking/ https://www.intezer.com/blog/malware-analysis/executable-and-linkable-format-101-part-3-relocations/ https://www.intezer.com/blog/malware-analysis/executable-linkable-format-101-part-2-symbols/ https://www.intezer.com/blog/research/executable-linkable-format-101-part1-sections-segments/"
X Link 2023-01-15T08:30Z 87.3K followers, 60.6K engagements
"Nice collection of material for getting started with reverse engineering and Ghidra (University of Cincinnati Malware Analysis Class) #reverseengineering #infoserc #cybersecurity #learning #beginner https://class.malware.re/ https://class.malware.re/"
X Link 2023-02-08T12:15Z 87.3K followers, 48.4K engagements
"Introduction to Linux kernel exploitation Series by @k3170Makan Debugging with QEMU: Stack Overflows: RIP control: #Linux #kernel #exploit #infosec #cybersecurity https://blog.k3170makan.com/2021/01/linux-kernel-exploitation-0x2.html http://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x0-debugging.html https://blog.k3170makan.com/2021/01/linux-kernel-exploitation-0x2.html http://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html"
X Link 2023-02-10T17:30Z 87.4K followers, 41.2K engagements
"Intro to malware reverse engineering Part 1: Part 2: Series by @IntezerLabs #malware #cybersecurity https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2024-10-05T15:30Z 87.3K followers, 36.3K engagements
"Collection of write-ups blog posts and papers related to cybersecurity reverse engineering and exploitation #infosec #cybersecurity https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md"
X Link 2024-10-06T07:30Z 87.3K followers, 34K engagements
"Reverse engineering and malware analysis (introduction for beginners) Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2025-03-22T16:30Z 87.3K followers, 39.4K engagements
"Introdution for beginners to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2025-03-23T08:30Z 87.3K followers, 36.2K engagements
"Reverse engineering and security analysis of an ESP32 based IoT device Blog post by James Warner (@jmswrnr) #esp32 #infosec https://jmswrnr.com/blog/hacking-a-smart-home-device https://jmswrnr.com/blog/hacking-a-smart-home-device"
X Link 2025-04-13T07:30Z 87.3K followers, 23.7K engagements
"Windows kernel exploitation for beginners Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2025-06-21T15:30Z 87.4K followers, 45.2K engagements
Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
/creator/twitter::0xor0ne