#  @0xor0ne 0xor0ne 0xor0ne posts on X about credits, tplink, if you, posts the most. They currently have [------] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours. ### Engagements: [------] [#](/creator/twitter::1293289704843075586/interactions)  - [--] Week [------] +60% - [--] Month [-------] -25% - [--] Months [---------] +41% - [--] Year [---------] -53% ### Mentions: [--] [#](/creator/twitter::1293289704843075586/posts_active)  - [--] Week [--] +76% - [--] Month [--] +20% - [--] Months [---] +55% - [--] Year [---] -8.50% ### Followers: [------] [#](/creator/twitter::1293289704843075586/followers)  - [--] Week [------] +0.15% - [--] Month [------] +1.50% - [--] Months [------] +8.80% - [--] Year [------] +21% ### CreatorRank: [-------] [#](/creator/twitter::1293289704843075586/influencer_rank)  ### Social Influence **Social category influence** [technology brands](/list/technology-brands) 10.38% [stocks](/list/stocks) 1.89% [gaming](/list/gaming) 1.89% [countries](/list/countries) 0.94% **Social topic influence** [credits](/topic/credits) 24.53%, [tplink](/topic/tplink) #46, [if you](/topic/if-you) 3.77%, [posts](/topic/posts) #76, [iot](/topic/iot) 2.83%, [android](/topic/android) 1.89%, [firmware](/topic/firmware) #27, [$googl](/topic/$googl) 1.89%, [level](/topic/level) 1.89%, [list](/topic/list) 1.89% **Top accounts mentioned or mentioned by** [@transilienceai](/creator/undefined) [@sergioprado](/creator/undefined) [@voidstarsec](/creator/undefined) [@intezerlabs](/creator/undefined) [@quarkslab](/creator/undefined) [@limitedresults](/creator/undefined) [@watchfulip](/creator/undefined) [@palantir555](/creator/undefined) [@momo5502](/creator/undefined) [@lordnoteworthy](/creator/undefined) [@idov31](/creator/undefined) [@cybernews_alert](/creator/undefined) [@natashenka](/creator/undefined) [@sethjenkins](/creator/undefined) [@neodyme](/creator/undefined) [@hyprdude](/creator/undefined) [@evilsocket](/creator/undefined) [@landaire](/creator/undefined) [@qkaiser](/creator/undefined) [@matheusgarbelin](/creator/undefined) **Top assets mentioned** [Alphabet Inc Class A (GOOGL)](/topic/$googl) ### Top Social Posts Top posts by engagements in the last [--] hours "Great 3-parts series on 0-click exploit chain targeting Android Pixel [--] Arbitrary code execution in mediacodec - kernel privilege escalation Part 1: Part 2: Part 3: Research by Natalie Silvanovich (@natashenka) and Seth Jenkins (@__sethJenkins) #infosec https://projectzero.google/2026/01/pixel-0-click-part-3.html https://projectzero.google/2026/01/pixel-0-click-part-2.html https://projectzero.google/2026/01/pixel-0-click-part-1.html https://projectzero.google/2026/01/pixel-0-click-part-3.html https://projectzero.google/2026/01/pixel-0-click-part-2.html" [X Link](https://x.com/0xor0ne/status/2021619971084730732) 2026-02-11T16:18Z 87.3K followers, [----] engagements "Bruteforcing ECC and dumping firmware from a Potensic Atom [--] drone Research by @Neodyme #infosec https://neodyme.io/en/blog/drone_hacking_part_1/#intro https://neodyme.io/en/blog/drone_hacking_part_1/#intro" [X Link](https://x.com/0xor0ne/status/2015469917831618977) 2026-01-25T17:00Z 87.1K followers, 11.1K engagements "Exploiting vulnerabilities in MediaTek MT76xx and MT7915 Wifi chipset family Credits @hyprdude #infosec https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html" [X Link](https://x.com/0xor0ne/status/2016783546619191409) 2026-01-29T08:00Z 87.2K followers, 12.8K engagements "Reverse engineering and dumping firmware from a low-cost smartwatch by Damien Cauquil (@quarkslab) #infosec https://blog.quarkslab.com/modern-tale-blinkenlights.html https://blog.quarkslab.com/modern-tale-blinkenlights.html" [X Link](https://x.com/0xor0ne/status/2017145953950585282) 2026-01-30T08:00Z 87.1K followers, 18.5K engagements "TP-Link Tapo C200 IP camera: security analysis and exploitation by @evilsocket #infosec #iot https://www.evilsocket.net/2025/12/18/TP-Link-Tapo-C200-Hardcoded-Keys-Buffer-Overflows-and-Privacy-in-the-Era-of-AI-Assisted-Reverse-Engineering/ https://www.evilsocket.net/2025/12/18/TP-Link-Tapo-C200-Hardcoded-Keys-Buffer-Overflows-and-Privacy-in-the-Era-of-AI-Assisted-Reverse-Engineering/" [X Link](https://x.com/0xor0ne/status/2011710144606781535) 2026-01-15T08:00Z 87.3K followers, 142.2K engagements "Deep-dive by @landaire into reverse engineering Splinter Cell's (2002) .lin Unreal Engine [--] archive format #ReverseEngineering https://landaire.net/a-file-format-uncracked-for-20-years/ https://landaire.net/a-file-format-uncracked-for-20-years/" [X Link](https://x.com/0xor0ne/status/2021857072824938577) 2026-02-12T08:01Z 87.3K followers, [----] engagements "Just a reminder of a few great tools for firmware unpacking repacking and analysis binwalk: EMBA: unblob: ofrak: #iot #embedded #reverseengineering #infosec https://github.com/redballoonsecurity/ofrak https://github.com/onekey-sec/unblob https://github.com/e-m-b-a/emba https://github.com/ReFirmLabs/binwalk https://github.com/redballoonsecurity/ofrak https://github.com/onekey-sec/unblob https://github.com/e-m-b-a/emba https://github.com/ReFirmLabs/binwalk" [X Link](https://x.com/0xor0ne/status/1619251448818155520) 2023-01-28T08:30Z 87.3K followers, 95K engagements "Excellent free book for anyone interested in Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/" [X Link](https://x.com/0xor0ne/status/1667207618220138496) 2023-06-09T16:30Z 87.3K followers, 227.8K engagements "Great free guide for learninig Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/" [X Link](https://x.com/0xor0ne/status/1690430489314594816) 2023-08-12T18:30Z 87.2K followers, 65.7K engagements "Excellent research on reverse engineering and pwning a Google Home Mini smart speaker. A must read if you are interested in embedded device security and vulnerability research. #iot #embedded #infosec #cybersecurity https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html" [X Link](https://x.com/0xor0ne/status/1716775318839537703) 2023-10-24T11:15Z 87.2K followers, 54.8K engagements "If you are a beginner and interested in malware analysis this is an excellent introduction series by @IntezerLabs Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/" [X Link](https://x.com/0xor0ne/status/1746253336636956993) 2024-01-13T19:30Z 87.3K followers, 46K engagements "Introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #cybersecurity https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/0xor0ne/status/1886097307638047009) 2025-02-02T17:00Z 87.3K followers, 40.8K engagements "TP-Link Tapo C200 reverse engineering and exploitation Credits @qkaiser #infosec #embedded https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/ https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/" [X Link](https://x.com/0xor0ne/status/2016187059593949391) 2026-01-27T16:30Z 87.2K followers, 29.9K engagements "Very cool repo for learning how to use rust for offensive security https://github.com/trickster0/OffensiveRust https://github.com/trickster0/OffensiveRust" [X Link](https://x.com/0xor0ne/status/1604891873100832768) 2022-12-19T17:30Z 87.3K followers, 45.7K engagements "If you're interested in bluetooth low level hacking take a look at this cool project by Matheus Eduardo Garbelini (@MatheusGarbelin) Active Bluetooth BR/EDR Sniffer/Injector: #bluetooth #esp32 #espressif #hacking #infosec https://github.com/Matheus-Garbelini/esp32_bluetooth_classic_sniffer https://github.com/Matheus-Garbelini/esp32_bluetooth_classic_sniffer" [X Link](https://x.com/0xor0ne/status/1606341450425311232) 2022-12-23T17:30Z 87.3K followers, 78.6K engagements "Cool secure boot bypass by fault injection in ESP32 CPUs by @LimitedResults #embedded #iot #hardware #faultinjection #infosec https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/ https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/" [X Link](https://x.com/0xor0ne/status/1610327674374717440) 2023-01-03T17:30Z 87.3K followers, 69.3K engagements "Secure boot bypass by fault injection in (Espressif) ESP32 CPUs Credits @LimitedResults #embedded #iot #hardware #faultinjection #infosec https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/ https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/" [X Link](https://x.com/0xor0ne/status/1662722898660917248) 2023-05-28T07:30Z 87.3K followers, 65K engagements "Cybersecurity related awesome list: blog posts write-ups papers and tools related to cybersecurity reverse engineering and exploitation #cybersecurity #infosec https://github.com/0xor0ne/awesome-list https://github.com/0xor0ne/awesome-list" [X Link](https://x.com/anyuser/status/1928059503238324563) 2025-05-29T12:03Z 87.3K followers, 52.4K engagements "Valve Anti-Cheat (VAC) reverse engineering #infosec https://codeneverdies.github.io/posts/gh-2/ https://codeneverdies.github.io/posts/gh-2/" [X Link](https://x.com/0xor0ne/status/1971960572171124812) 2025-09-27T15:30Z 87.3K followers, 48.8K engagements "Heap overflow in MediaTek's DA2 USB file download handler that gives code execution on (Carbonara) patched V6 devices Research by @r0rt1z2 and shomy #infosec https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/ https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/" [X Link](https://x.com/anyuser/status/2017636519947743368) 2026-01-31T16:30Z 87.3K followers, [----] engagements "Clang Hardening Cheat Sheet (2026) Credits @0xTRIKKSS and @bcreusillet (@quarkslab) #infosec https://blog.quarkslab.com/clang-hardening-cheat-sheet-ten-years-later.html https://blog.quarkslab.com/clang-hardening-cheat-sheet-ten-years-later.html" [X Link](https://x.com/0xor0ne/status/2018006846569648474) 2026-02-01T17:01Z 87.3K followers, [----] engagements "TP-Link (Tapo) C210 cloud camera: bootloader vulnerability and firmware decryption by @Watchful_IP #infosec https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html" [X Link](https://x.com/0xor0ne/status/2018354617931768124) 2026-02-02T16:03Z 87.3K followers, 15.1K engagements ""From Zero to QEMU: A journey into system emulation" (slide deck by Antonio Nappa) #infosec #qemu https://docs.google.com/presentation/d/1g0hTGKXWf6EvyUIjw4qomJ5CGrV245nbGn5p-yNu1Sc/editslide=id.g357295fe39c_0_3#slide=id.g357295fe39c_0_3 https://docs.google.com/presentation/d/1g0hTGKXWf6EvyUIjw4qomJ5CGrV245nbGn5p-yNu1Sc/editslide=id.g357295fe39c_0_3#slide=id.g357295fe39c_0_3" [X Link](https://x.com/0xor0ne/status/2018595582076473401) 2026-02-03T08:01Z 87.3K followers, 28.7K engagements ""DIRTYFREE: Simplified Data-Oriented Programming in the Linux Kernel" (paper) Authors: Yoochan Lee Hyuk Kwon and Thorsten Holz #infosec #Linux https://leeyoochan.github.io/assets/pdf/DirtyFree_NDSS_2026.pdf https://leeyoochan.github.io/assets/pdf/DirtyFree_NDSS_2026.pdf" [X Link](https://x.com/0xor0ne/status/2018723757104202027) 2026-02-03T16:30Z 87.3K followers, [----] engagements "Airoha Bluetooth RACE vulnerabilities (CVE-2025-20700/20701/20702) Blog post: White paper: Credits Dennis Heinze Frieder Steinmetz (@ERNW_ITSec) #infosec #bluetooth https://static.ernw.de/whitepaper/ERNW_White_Paper_74_1.0.pdf https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/ https://static.ernw.de/whitepaper/ERNW_White_Paper_74_1.0.pdf https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/" [X Link](https://x.com/0xor0ne/status/2019079118717882717) 2026-02-04T16:02Z 87.3K followers, [----] engagements "Reverse engineering Realtek RTL8761B* Bluetooth chips to make better Bluetooth security tools & classes (slide deck by @XenoKovah) #infosec https://darkmentor.com/publication/2025-11-hardweario/ https://darkmentor.com/publication/2025-11-hardweario/" [X Link](https://x.com/0xor0ne/status/2019320295308341375) 2026-02-05T08:00Z 87.3K followers, 14.3K engagements "Beginners intro to Linux kernel fuzzing and vulnerability research (2024 blog post series by @slava_moskvin_) Part 1: Part 2: Part 3: #Linux #cybersecurity https://slavamoskvin.com/finding-bugs-in-kernel.-part-2-fuzzing-the-actual-kernel/ https://slavamoskvin.com/finding-bugs-in-kernel.-part-1-crashing-a-vulnerable-driver-with-syzkaller/ https://slavamoskvin.com/hunting-bugs-in-linux-kernel-with-kasan-how-to-use-it-whats-the-benefit/ https://slavamoskvin.com/finding-bugs-in-kernel.-part-2-fuzzing-the-actual-kernel/" [X Link](https://x.com/0xor0ne/status/2019441325595152862) 2026-02-05T16:01Z 87.3K followers, [----] engagements "Deep dive into how Windows on ARM handles interrupts by Connor McGarr (@33y0re) #Windows #infosec https://connormcgarr.github.io/windows-arm64-interrupts/ https://connormcgarr.github.io/windows-arm64-interrupts/" [X Link](https://x.com/0xor0ne/status/2019682667474592109) 2026-02-06T08:00Z 87.3K followers, [----] engagements "CVE-2025-3052 explained: running unsigned code during the UEFI boot process Credits @binarly_io #infosec https://www.binarly.io/blog/another-crack-in-the-chain-of-trust https://www.binarly.io/blog/another-crack-in-the-chain-of-trust" [X Link](https://x.com/anyuser/status/2019803705537597562) 2026-02-06T16:01Z 87.3K followers, [----] engagements "Command & Conquer: network architecture exposed attack surface discovered vulnerabilities and exploitation Research by Bryan Alexander and Jordan Whitehead #infosec https://www.atredis.com/blog/2026/1/26/generals https://www.atredis.com/blog/2026/1/26/generals" [X Link](https://x.com/0xor0ne/status/2020173234604236897) 2026-02-07T16:30Z 87.3K followers, [----] engagements "Unauthenticated RCE in NetSupport Manager by chaining CVE-2025-34164 (heap OOB write) and CVE-2025-34165 (stack OOB read) Credits Fabian Weber (@codewhitesec) #infosec https://code-white.com/blog/2026-01-nsm-rce/ https://code-white.com/blog/2026-01-nsm-rce/" [X Link](https://x.com/0xor0ne/status/2020543284297281727) 2026-02-08T17:00Z 87.3K followers, [----] engagements "Short beginners introduction to virtual memory #cybersecurity https://nghiant3223.github.io/2025/05/29/fundamental_of_virtual_memory.html https://nghiant3223.github.io/2025/05/29/fundamental_of_virtual_memory.html" [X Link](https://x.com/0xor0ne/status/2020890806840590559) 2026-02-09T16:01Z 87.3K followers, [----] engagements "Exploiting Linux by abusing page table entries #Linux #infosec https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326 https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326" [X Link](https://x.com/0xor0ne/status/2021132261588881765) 2026-02-10T08:00Z 87.3K followers, 10.9K engagements "Escalate privileges from a rooted user space (N-EL0) to the highest privilege level in the Secure World (S-EL3) (Android Xiaomi Redmi 11s) (CCC 2025) #infosec https://media.ccc.de/v/39c3-not-to-be-trusted-a-fiasco-in-android-tees https://media.ccc.de/v/39c3-not-to-be-trusted-a-fiasco-in-android-tees" [X Link](https://x.com/0xor0ne/status/2021260593978593432) 2026-02-10T16:30Z 87.3K followers, [----] engagements "Dirty Pageflags: abusing page table entries for exploiting Linux #Linux #infosec https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326 https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326" [X Link](https://x.com/0xor0ne/status/2021978129317638628) 2026-02-12T16:02Z 87.3K followers, [----] engagements "MediaTek exploit that lets you write to arbitrary memory via the Download Agent bypassing DA2 signature verification Blog post by @shomykohai #infosec https://shomy.is-a.dev/blog/article/serving-carbonara https://shomy.is-a.dev/blog/article/serving-carbonara" [X Link](https://x.com/0xor0ne/status/2022219416595755054) 2026-02-13T08:00Z 87.3K followers, [----] engagements "Cybersecurity blog posts writeups papers and tools #infosec https://github.com/0xor0ne/awesome-list https://github.com/0xor0ne/awesome-list" [X Link](https://x.com/0xor0ne/status/2022340634669920335) 2026-02-13T16:02Z 87.3K followers, 19K engagements "(1/4) Great series on Linux rootkits by @TheXcellerator Part 1: Introduction and Workflow: Part 2: Ftrace and Function Hooking: Part 3: A Backdoor to Root: #Linux #kernel #malware #infosec #cybersecurity https://xcellerator.github.io/posts/linux_rootkits_03/ https://xcellerator.github.io/posts/linux_rootkits_02/ https://xcellerator.github.io/posts/linux_rootkits_01/ https://xcellerator.github.io/posts/linux_rootkits_03/ https://xcellerator.github.io/posts/linux_rootkits_02/ https://xcellerator.github.io/posts/linux_rootkits_01/" [X Link](https://x.com/0xor0ne/status/1629564428785000448) 2023-02-25T19:30Z 87.3K followers, 58.3K engagements "Great website if you need a quick reference to Linux kernel syscalls (numbers) #Linux https://syscalls.mebeim.net/ https://syscalls.mebeim.net/" [X Link](https://x.com/0xor0ne/status/1649450442437406725) 2023-04-21T16:30Z 87.2K followers, 78K engagements "Nice series introducing cryptography concepts for beginners (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/" [X Link](https://x.com/0xor0ne/status/1649843017249964032) 2023-04-22T18:30Z 87.3K followers, 73.6K engagements "Nice reading for anyone interested in Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/" [X Link](https://x.com/0xor0ne/status/1650039320449785857) 2023-04-23T07:30Z 87.2K followers, 117.5K engagements "Nice intro for beginners to bluetooth communications reverse engineering (Domyos EL500) Credits @Palantir555 #bluetooth https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/ https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/" [X Link](https://x.com/0xor0ne/status/1657453213010784258) 2023-05-13T18:30Z 87.3K followers, 58.5K engagements "Reverse engineering the runtime code integrity protection of Call of Duty: Black Ops [--] Blog post by @momo5502 #reverseengineering https://buff.ly/3Xwv5N https://buff.ly/3Xwv5N" [X Link](https://x.com/0xor0ne/status/1658430857508519936) 2023-05-16T11:15Z 87.3K followers, 66.7K engagements "(1/2) Excellent series by @LordNoteworthy explaining how virtualization on x86 works Intro to Virtualization: VMWare and Full Virtualization using Binary Translation: #virtualization #hacking #infotech #infosec #learning https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/ https://docs.saferwall.com/blog/virtualization-internals-part-1-intro-to-virtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/" [X Link](https://x.com/0xor0ne/status/1660186185405276160) 2023-05-21T07:30Z 87.2K followers, 68.3K engagements "Nice beginners series by @IntezerLabs on malware reverse engineering Part 1: Part 2: #malware https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/" [X Link](https://x.com/0xor0ne/status/1662134193059426305) 2023-05-26T16:30Z 87.3K followers, 61.6K engagements "Excellent research work for anyone interested in Wi-Fi security MiTM by exploiting cross-layer interactions between WPAs and ICMP #wifi #infosec #cybersecurity #wireless https://csis.gmu.edu/ksun/publications/WiFi_Interception_SP23.pdf https://csis.gmu.edu/ksun/publications/WiFi_Interception_SP23.pdf" [X Link](https://x.com/0xor0ne/status/1663092875284840449) 2023-05-29T08:00Z 87.3K followers, 87.3K engagements "Excellent series on Windows rootkit development for red teaming Credits @Idov31 Part 1: Part 2: Part 3: Part 4: #windows #driver #kernel #rootkit #redteam https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html" [X Link](https://x.com/0xor0ne/status/1664670822718373888) 2023-06-02T16:30Z 87.3K followers, 86.6K engagements "Great website if you need a quick reference to Linux kernel syscalls (numbers) #Linux #syscall #kernel https://syscalls.mebeim.net https://syscalls.mebeim.net" [X Link](https://x.com/0xor0ne/status/1667600029643571203) 2023-06-10T18:30Z 87.3K followers, 121.5K engagements "Excellent introduction to cryptography concepts for beginners (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/" [X Link](https://x.com/0xor0ne/status/1668166398865022978) 2023-06-12T08:00Z 87.2K followers, 179.3K engagements "In case you missed this is a great series by greenluigi1 on car Infotainment system hacking Part 1: Part 2: Part 3: #hacking #automotive #carhacking #infosec #cybersecurity https://programmingwithstyle.com/posts/howihackedmycarpart3/ https://programmingwithstyle.com/posts/howihackedmycarpart2/ https://programmingwithstyle.com/posts/howihackedmycar/ https://programmingwithstyle.com/posts/howihackedmycarpart3/ https://programmingwithstyle.com/posts/howihackedmycarpart2/ https://programmingwithstyle.com/posts/howihackedmycar/" [X Link](https://x.com/0xor0ne/status/1668513769750769665) 2023-06-13T07:00Z 87.3K followers, 86.2K engagements "Home router hacking presentation at HITB2023 (@NCCGroupInfosec) "Your not so Home Office - SOHO Hacking at Pwn2Own" #soho #router #exploit #embedded #iot #infosec #cybersecurity http://conference.hitb.org/files/hitbsecconf2023ams/materials/D1T1%20-%20Your%20Not%20So%20Home%20Office%20-%20Soho%20Hacking%20at%20Pwn2Own%20-%20McCaulay%20Hudson%20&%20Alex%20Plaskett.pdf http://conference.hitb.org/files/hitbsecconf2023ams/materials/D1T1%20-%20Your%20Not%20So%20Home%20Office%20-%20Soho%20Hacking%20at%20Pwn2Own%20-%20McCaulay%20Hudson%20&%20Alex%20Plaskett.pdf" [X Link](https://x.com/anyuser/status/1669600918617169928) 2023-06-16T07:00Z 87.2K followers, 115.8K engagements "Very useful guide for learning Make (and Makefiles) #make #makefile #infosec #cybersecurity https://makefiletutorial.com https://makefiletutorial.com" [X Link](https://x.com/0xor0ne/status/1670499134644670471) 2023-06-18T18:30Z 87.3K followers, 111.6K engagements "Excellent blog post on reverse engineering and pwning a Google Home Mini smart speaker. A must read for anyone interested in embedded device security and vulnerability research. #iot #embedded #infosec #cybersecurity https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html" [X Link](https://x.com/0xor0ne/status/1670831432091009024) 2023-06-19T16:30Z 87.3K followers, 101.6K engagements "Excellent series for learning a bit more about Linux kernel internals and exploitation techniques Credits @_lkmidas Part 1: Part 2: Part 3: #Linux https://lkmidas.github.io/posts/20210205-linux-kernel-pwn-part-3/ https://lkmidas.github.io/posts/20210128-linux-kernel-pwn-part-2/ https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/ https://lkmidas.github.io/posts/20210205-linux-kernel-pwn-part-3/ https://lkmidas.github.io/posts/20210128-linux-kernel-pwn-part-2/ https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/" [X Link](https://x.com/0xor0ne/status/1672869767827406848) 2023-06-25T07:30Z 87.3K followers, 70.1K engagements "Cool series to learn IoT/embedded devices reverse engineering (credits @Palantir555) Debug Ports: Firmware: Data: Flash: Digging the Firmware: #iot https://buff.ly/3WUY50u https://buff.ly/3WKnhay https://buff.ly/3WRz5r4 https://buff.ly/3WHNOFo https://buff.ly/3WGw513 https://buff.ly/3WUY50u https://buff.ly/3WKnhay https://buff.ly/3WRz5r4 https://buff.ly/3WHNOFo https://buff.ly/3WGw513" [X Link](https://x.com/0xor0ne/status/1673651159427416064) 2023-06-27T11:15Z 87.3K followers, 63.4K engagements "Here are a few resources for getting started with Satellite hacking and CTFs Satellite Hacking Demystified: Hack-a-sat writeups: Hack-a-sat players corner: #satellite #infosec https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/Satellite-Hacking-Demystified/ https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/Satellite-Hacking-Demystified/" [X Link](https://x.com/0xor0ne/status/1689169806119882752) 2023-08-09T07:00Z 87.2K followers, 60.7K engagements "Excellent introduction to cryptography concepts for beginners with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/" [X Link](https://x.com/0xor0ne/status/1690996983064895489) 2023-08-14T08:01Z 87.2K followers, 84.8K engagements "Interesting series on how virtualization works (VMware XEN QEMU) Credits @LordNoteworthy Part 1: Part 2: Part 3: Part 4: #virtualization #infotech https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu https://docs.saferwall.com/blog/virtualization-internals-part-3-xen-and-paravirtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/ https://docs.saferwall.com/blog/virtualization-internals-part-1-intro-to-virtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu" [X Link](https://x.com/0xor0ne/status/1699482783557534073) 2023-09-06T18:00Z 87.2K followers, 63.6K engagements "Beginner introduction to cryptography concepts with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/" [X Link](https://x.com/0xor0ne/status/1711637730692587612) 2023-10-10T07:00Z 87.2K followers, 87.2K engagements "Introduction guide to Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/" [X Link](https://x.com/0xor0ne/status/1712551261780742440) 2023-10-12T19:30Z 87.2K followers, 88K engagements "Windows rootkit development for red teaming Excellent series by @Idov31 Part 1: Part 2: Part 3: Part 4: PArt 5: #windows #driver #kernel #rootkit #redteam https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html" [X Link](https://x.com/0xor0ne/status/1715087946427105415) 2023-10-19T19:30Z 87.3K followers, 61.4K engagements "Reverse engineering the Brightway (Xiaomi) scooters Interesting blog post for anyone interested in embedded devices reverse engineering #reverseengineering #cybersecurity #infotech https://robocoffee.de/p=436 https://robocoffee.de/p=436" [X Link](https://x.com/0xor0ne/status/1718545720481845594) 2023-10-29T08:30Z 87.2K followers, 70.8K engagements "List of links to blog posts write-ups and papers related to cybersecurity reverse engineering and exploitation (constantly updated) #cybersecurity #infosec https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.mdref=0xor0ne.xyz https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.mdref=0xor0ne.xyz" [X Link](https://x.com/0xor0ne/status/1729168430501130378) 2023-11-27T16:00Z 87.2K followers, 103.9K engagements "MikroTik routers reverse engineering and exploitation Excellent work by @hgarrereyn and @__comedian Blog post: Slides (RECon): #iot #mikrotik #cybsersecurity https://github.com/MarginResearch/resources/blob/83e402a86370f7c3acf8bb3ad982c1fee89c9b53/documents/Pulling_MikroTik_into_the_Limelight.pdf https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/ https://github.com/MarginResearch/resources/blob/83e402a86370f7c3acf8bb3ad982c1fee89c9b53/documents/Pulling_MikroTik_into_the_Limelight.pdf https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/" [X Link](https://x.com/0xor0ne/status/1731229299384984022) 2023-12-03T08:30Z 87.3K followers, 56.7K engagements "Introduction to cryptography concepts for beginners with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ref=0xor0ne.xyz https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ref=0xor0ne.xyz https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ref=0xor0ne.xyz https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ref=0xor0ne.xyz" [X Link](https://x.com/0xor0ne/status/1732090090887766487) 2023-12-05T17:30Z 87.2K followers, 56.3K engagements ""The Linux Kernel Module Programming Guide" Introduction guide to Linux kernel internals and modules development (updated to 5.x kernels) #Linux #kernel #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/" [X Link](https://x.com/0xor0ne/status/1732671539579871273) 2023-12-07T08:01Z 87.3K followers, 52.2K engagements "Call of Duty: Black Ops [--] - Reverse engineering of runtime code integrity protection Writeup by @momo5502 #reverseengineering #infosec https://web.archive.org/web/20230522230748/https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/ https://web.archive.org/web/20230522230748/https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/" [X Link](https://x.com/0xor0ne/status/1733403626385625346) 2023-12-09T08:30Z 87.2K followers, 47.6K engagements "Beginner intro to cryptography concepts with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/" [X Link](https://x.com/0xor0ne/status/1755645237358104855) 2024-02-08T17:30Z 87.2K followers, 32.1K engagements "Interesting project attempting to reverse engineering the precompiled Wi-Fi stack of ESP32 SoC to recreate an open source version Part 1: Part 2: Repo: #esp32 #infosec https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/" [X Link](https://x.com/0xor0ne/status/1764206593799807015) 2024-03-03T08:30Z 87.3K followers, 33.6K engagements "Excellent beginners introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/0xor0ne/status/1770865469899030673) 2024-03-21T17:30Z 87.3K followers, 32.6K engagements "Beginners series for starting with embedded devices reverse engineering Credits @voidstarsec Ghidra setup: Tools: Firmware extraction: #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment" [X Link](https://x.com/0xor0ne/status/1771575136677659065) 2024-03-23T16:30Z 87.2K followers, 33.5K engagements "Reverse engineering and vulnerability analysis of DJI drones' firmware. A two-parts blog series by @nozominetworks Firmware Analysis: Vulnerability Analysis: Particularly interesting is the chain of weak Wi-Fi password cracking (CVE-2023-6951) followed by the unauthenticated video exfiltration (CVE-2023-6949) #dji #drone https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-1-firmware-analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis" [X Link](https://x.com/anyuser/status/1775178741401985462) 2024-04-02T15:09Z 87.2K followers, 43.4K engagements "Must read guide for anyone starting with Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/" [X Link](https://x.com/0xor0ne/status/1779577886875201737) 2024-04-14T18:30Z 87.2K followers, 43.5K engagements "Nice introduction to Windows kernel exploitation for beginners Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/0xor0ne/status/1785640468178407812) 2024-05-01T12:00Z 87.2K followers, 32.4K engagements "Getting started with embedded devices reverse engineering (Beginners series) Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment" [X Link](https://x.com/0xor0ne/status/1816005412639944715) 2024-07-24T07:00Z 87.2K followers, 23.3K engagements "Get started with Satellite hacking and CTFs Satellite Hacking Demystified: Hack-a-sat writeups: Hack-a-sat players corner: #satellite #cybersecurity https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/satellite-hacking-demystified https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/satellite-hacking-demystified" [X Link](https://x.com/0xor0ne/status/1817100119361060948) 2024-07-27T07:30Z 87.2K followers, 36.7K engagements "Reverse engineering of ESP32's precompiled Wi-Fi stack Part 1: Part 2: Repo: #esp32 #cybersecurity https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/" [X Link](https://x.com/0xor0ne/status/1822173551706685850) 2024-08-10T07:30Z 87.3K followers, 39.9K engagements "Beginners intro to Linux kernel exploitation (env setup and ret2usr) Part 1: Part 2: #Linux #cybersecurity http://scoding.de/linux-kernel-exploitation-buffer_overflow http://scoding.de/linux-kernel-exploitation-environment http://scoding.de/linux-kernel-exploitation-buffer_overflow http://scoding.de/linux-kernel-exploitation-environment" [X Link](https://x.com/0xor0ne/status/1833400105803637166) 2024-09-10T07:00Z 87.2K followers, 41.5K engagements "Intro to windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/0xor0ne/status/1835347968913821697) 2024-09-15T16:00Z 87.2K followers, 51.2K engagements "Beginners intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment" [X Link](https://x.com/0xor0ne/status/1837514650193105207) 2024-09-21T15:30Z 87.2K followers, 65.3K engagements "Open source Wi-Fi stack for ESP32 SoCs through reverse engineering pre-compiled binary blobs Part 1: Part 2: Repo: #esp32 #cybersecurity https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/" [X Link](https://x.com/0xor0ne/status/1839560629532660084) 2024-09-27T07:00Z 87.2K followers, 38.1K engagements "Introduction to Linux kernel internals and modules development "The Linux Kernel Module Programming Guide" #Linux #infosec https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/" [X Link](https://x.com/0xor0ne/status/1840292943808119249) 2024-09-29T07:30Z 87.2K followers, 34.9K engagements "Intro to malware reverse engineering Part 1: Part 2: Series by @IntezerLabs #malware #cybersecurity https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/" [X Link](https://x.com/0xor0ne/status/1842588090520453296) 2024-10-05T15:30Z 87.2K followers, 36.3K engagements "Collection of write-ups blog posts and papers related to cybersecurity reverse engineering and exploitation #infosec #cybersecurity https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md" [X Link](https://x.com/0xor0ne/status/1842829665481748982) 2024-10-06T07:30Z 87.2K followers, 33.9K engagements "Intro for beginners to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment" [X Link](https://x.com/0xor0ne/status/1851172122711773524) 2024-10-29T08:00Z 87.3K followers, 31.7K engagements "Windows kernel exploitation beginners introduction Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/0xor0ne/status/1851655363474366709) 2024-10-30T16:00Z 87.2K followers, 31.9K engagements "Introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/0xor0ne/status/1860601769539076542) 2024-11-24T08:30Z 87.2K followers, 28.8K engagements "Intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment" [X Link](https://x.com/0xor0ne/status/1871949104974123486) 2024-12-25T16:00Z 87.2K followers, 34.4K engagements "Easy introduction to cryptography concept with practical examples in Linux (openssl) Part 1: Part 2: Part 3: Part 4: Credits @sergioprado #cryptography #infosec https://sergioprado.blog/what-are-random-numbers-and-how-they-are-managed-on-linux/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/what-are-random-numbers-and-how-they-are-managed-on-linux/" [X Link](https://x.com/0xor0ne/status/1874002642474577998) 2024-12-31T08:00Z 87.2K followers, 43.2K engagements "Reverse engineering and malware analysis series Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/" [X Link](https://x.com/0xor0ne/status/1883560559091540043) 2025-01-26T17:00Z 87.2K followers, 34.3K engagements "Iptables for local privilege escalation #Linux #infosec https://www.shielder.com/blog/2024/09/a-journey-from-sudo-iptables-to-local-privilege-escalation/ https://www.shielder.com/blog/2024/09/a-journey-from-sudo-iptables-to-local-privilege-escalation/" [X Link](https://x.com/0xor0ne/status/1885727331550945326) 2025-02-01T16:30Z 87.3K followers, 33.3K engagements "Intercepting Linux system calls #cybersecurity #Linux https://blog.mggross.com/intercepting-syscalls/ https://blog.mggross.com/intercepting-syscalls/" [X Link](https://x.com/0xor0ne/status/1887410940724891734) 2025-02-06T08:00Z 87.2K followers, 29.5K engagements "Nice introduction to Linux kernel rootkits #Linux #infosec https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits" [X Link](https://x.com/0xor0ne/status/1890800751749853583) 2025-02-15T16:30Z 87.2K followers, 40.4K engagements "Introduction to reverse engineering and malware analysis Part 1: Part 2: #malware #cybersecurity https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/" [X Link](https://x.com/0xor0ne/status/1891042344926928992) 2025-02-16T08:30Z 87.2K followers, 36.5K engagements "Intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment" [X Link](https://x.com/0xor0ne/status/1891887913383670159) 2025-02-18T16:30Z 87.2K followers, 36.7K engagements "Introduction for beginners to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #cybersecurity https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/0xor0ne/status/1902034780964737376) 2025-03-18T16:30Z 87.2K followers, 25.7K engagements "Beginners introduction to Linux kernel rootkits #Linux #cybersecurity https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits" [X Link](https://x.com/0xor0ne/status/1902389716357673028) 2025-03-19T16:00Z 87.2K followers, 36.2K engagements "Reverse engineering and malware analysis (introduction for beginners) Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/" [X Link](https://x.com/0xor0ne/status/1903484335254098352) 2025-03-22T16:30Z 87.2K followers, 39.4K engagements "Introdution for beginners to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment" [X Link](https://x.com/0xor0ne/status/1903725926963368003) 2025-03-23T08:30Z 87.2K followers, 36.2K engagements "Write-ups blog posts and papers related to cybersecurity reverse engineering and exploitation #infosec #cybersecurity https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md" [X Link](https://x.com/0xor0ne/status/1906247545417806163) 2025-03-30T07:30Z 87.2K followers, 32.1K engagements "Reverse engineering and security analysis of an ESP32 based IoT device Blog post by James Warner (@jmswrnr) #esp32 #infosec https://jmswrnr.com/blog/hacking-a-smart-home-device https://jmswrnr.com/blog/hacking-a-smart-home-device" [X Link](https://x.com/anyuser/status/1911321038341784041) 2025-04-13T07:30Z 87.2K followers, 23.7K engagements "Short introduction to Linux kernel rootkits #Linux #cybersecurity https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits" [X Link](https://x.com/anyuser/status/1913616220739223907) 2025-04-19T15:30Z 87.2K followers, 28.8K engagements "Valve Anti-Cheat (VAC) solution reverse engineering #infosec #reverseengineering https://codeneverdies.github.io/posts/gh-2/ https://codeneverdies.github.io/posts/gh-2/" [X Link](https://x.com/anyuser/status/1923763047077732390) 2025-05-17T15:30Z 87.2K followers, 32.7K engagements "Linux kernel rootkits: beginners introduction #Linux #infosec https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits" [X Link](https://x.com/anyuser/status/1924721987181551776) 2025-05-20T07:00Z 87.2K followers, 24.8K engagements "Windows kernel exploitation for beginners Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/" [X Link](https://x.com/anyuser/status/1936446621140545945) 2025-06-21T15:30Z 87.2K followers, 45.2K engagements "Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras by @Watchful_IP #embedded #cybersecurity https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html" [X Link](https://x.com/0xor0ne/status/1969793887548961121) 2025-09-21T16:00Z 87.2K followers, 30.5K engagements Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
@0xor0ne 0xor0ne0xor0ne posts on X about credits, tplink, if you, posts the most. They currently have [------] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours.
Social category influence technology brands 10.38% stocks 1.89% gaming 1.89% countries 0.94%
Social topic influence credits 24.53%, tplink #46, if you 3.77%, posts #76, iot 2.83%, android 1.89%, firmware #27, $googl 1.89%, level 1.89%, list 1.89%
Top accounts mentioned or mentioned by @transilienceai @sergioprado @voidstarsec @intezerlabs @quarkslab @limitedresults @watchfulip @palantir555 @momo5502 @lordnoteworthy @idov31 @cybernews_alert @natashenka @sethjenkins @neodyme @hyprdude @evilsocket @landaire @qkaiser @matheusgarbelin
Top assets mentioned Alphabet Inc Class A (GOOGL)
Top posts by engagements in the last [--] hours
"Great 3-parts series on 0-click exploit chain targeting Android Pixel [--] Arbitrary code execution in mediacodec - kernel privilege escalation Part 1: Part 2: Part 3: Research by Natalie Silvanovich (@natashenka) and Seth Jenkins (@__sethJenkins) #infosec https://projectzero.google/2026/01/pixel-0-click-part-3.html https://projectzero.google/2026/01/pixel-0-click-part-2.html https://projectzero.google/2026/01/pixel-0-click-part-1.html https://projectzero.google/2026/01/pixel-0-click-part-3.html https://projectzero.google/2026/01/pixel-0-click-part-2.html"
X Link 2026-02-11T16:18Z 87.3K followers, [----] engagements
"Bruteforcing ECC and dumping firmware from a Potensic Atom [--] drone Research by @Neodyme #infosec https://neodyme.io/en/blog/drone_hacking_part_1/#intro https://neodyme.io/en/blog/drone_hacking_part_1/#intro"
X Link 2026-01-25T17:00Z 87.1K followers, 11.1K engagements
"Exploiting vulnerabilities in MediaTek MT76xx and MT7915 Wifi chipset family Credits @hyprdude #infosec https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html"
X Link 2026-01-29T08:00Z 87.2K followers, 12.8K engagements
"Reverse engineering and dumping firmware from a low-cost smartwatch by Damien Cauquil (@quarkslab) #infosec https://blog.quarkslab.com/modern-tale-blinkenlights.html https://blog.quarkslab.com/modern-tale-blinkenlights.html"
X Link 2026-01-30T08:00Z 87.1K followers, 18.5K engagements
"TP-Link Tapo C200 IP camera: security analysis and exploitation by @evilsocket #infosec #iot https://www.evilsocket.net/2025/12/18/TP-Link-Tapo-C200-Hardcoded-Keys-Buffer-Overflows-and-Privacy-in-the-Era-of-AI-Assisted-Reverse-Engineering/ https://www.evilsocket.net/2025/12/18/TP-Link-Tapo-C200-Hardcoded-Keys-Buffer-Overflows-and-Privacy-in-the-Era-of-AI-Assisted-Reverse-Engineering/"
X Link 2026-01-15T08:00Z 87.3K followers, 142.2K engagements
"Deep-dive by @landaire into reverse engineering Splinter Cell's (2002) .lin Unreal Engine [--] archive format #ReverseEngineering https://landaire.net/a-file-format-uncracked-for-20-years/ https://landaire.net/a-file-format-uncracked-for-20-years/"
X Link 2026-02-12T08:01Z 87.3K followers, [----] engagements
"Just a reminder of a few great tools for firmware unpacking repacking and analysis binwalk: EMBA: unblob: ofrak: #iot #embedded #reverseengineering #infosec https://github.com/redballoonsecurity/ofrak https://github.com/onekey-sec/unblob https://github.com/e-m-b-a/emba https://github.com/ReFirmLabs/binwalk https://github.com/redballoonsecurity/ofrak https://github.com/onekey-sec/unblob https://github.com/e-m-b-a/emba https://github.com/ReFirmLabs/binwalk"
X Link 2023-01-28T08:30Z 87.3K followers, 95K engagements
"Excellent free book for anyone interested in Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2023-06-09T16:30Z 87.3K followers, 227.8K engagements
"Great free guide for learninig Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2023-08-12T18:30Z 87.2K followers, 65.7K engagements
"Excellent research on reverse engineering and pwning a Google Home Mini smart speaker. A must read if you are interested in embedded device security and vulnerability research. #iot #embedded #infosec #cybersecurity https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html"
X Link 2023-10-24T11:15Z 87.2K followers, 54.8K engagements
"If you are a beginner and interested in malware analysis this is an excellent introduction series by @IntezerLabs Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2024-01-13T19:30Z 87.3K followers, 46K engagements
"Introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #cybersecurity https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2025-02-02T17:00Z 87.3K followers, 40.8K engagements
"TP-Link Tapo C200 reverse engineering and exploitation Credits @qkaiser #infosec #embedded https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/ https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/"
X Link 2026-01-27T16:30Z 87.2K followers, 29.9K engagements
"Very cool repo for learning how to use rust for offensive security https://github.com/trickster0/OffensiveRust https://github.com/trickster0/OffensiveRust"
X Link 2022-12-19T17:30Z 87.3K followers, 45.7K engagements
"If you're interested in bluetooth low level hacking take a look at this cool project by Matheus Eduardo Garbelini (@MatheusGarbelin) Active Bluetooth BR/EDR Sniffer/Injector: #bluetooth #esp32 #espressif #hacking #infosec https://github.com/Matheus-Garbelini/esp32_bluetooth_classic_sniffer https://github.com/Matheus-Garbelini/esp32_bluetooth_classic_sniffer"
X Link 2022-12-23T17:30Z 87.3K followers, 78.6K engagements
"Cool secure boot bypass by fault injection in ESP32 CPUs by @LimitedResults #embedded #iot #hardware #faultinjection #infosec https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/ https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/"
X Link 2023-01-03T17:30Z 87.3K followers, 69.3K engagements
"Secure boot bypass by fault injection in (Espressif) ESP32 CPUs Credits @LimitedResults #embedded #iot #hardware #faultinjection #infosec https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/ https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/"
X Link 2023-05-28T07:30Z 87.3K followers, 65K engagements
"Cybersecurity related awesome list: blog posts write-ups papers and tools related to cybersecurity reverse engineering and exploitation #cybersecurity #infosec https://github.com/0xor0ne/awesome-list https://github.com/0xor0ne/awesome-list"
X Link 2025-05-29T12:03Z 87.3K followers, 52.4K engagements
"Valve Anti-Cheat (VAC) reverse engineering #infosec https://codeneverdies.github.io/posts/gh-2/ https://codeneverdies.github.io/posts/gh-2/"
X Link 2025-09-27T15:30Z 87.3K followers, 48.8K engagements
"Heap overflow in MediaTek's DA2 USB file download handler that gives code execution on (Carbonara) patched V6 devices Research by @r0rt1z2 and shomy #infosec https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/ https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/"
X Link 2026-01-31T16:30Z 87.3K followers, [----] engagements
"Clang Hardening Cheat Sheet (2026) Credits @0xTRIKKSS and @bcreusillet (@quarkslab) #infosec https://blog.quarkslab.com/clang-hardening-cheat-sheet-ten-years-later.html https://blog.quarkslab.com/clang-hardening-cheat-sheet-ten-years-later.html"
X Link 2026-02-01T17:01Z 87.3K followers, [----] engagements
"TP-Link (Tapo) C210 cloud camera: bootloader vulnerability and firmware decryption by @Watchful_IP #infosec https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html"
X Link 2026-02-02T16:03Z 87.3K followers, 15.1K engagements
""From Zero to QEMU: A journey into system emulation" (slide deck by Antonio Nappa) #infosec #qemu https://docs.google.com/presentation/d/1g0hTGKXWf6EvyUIjw4qomJ5CGrV245nbGn5p-yNu1Sc/editslide=id.g357295fe39c_0_3#slide=id.g357295fe39c_0_3 https://docs.google.com/presentation/d/1g0hTGKXWf6EvyUIjw4qomJ5CGrV245nbGn5p-yNu1Sc/editslide=id.g357295fe39c_0_3#slide=id.g357295fe39c_0_3"
X Link 2026-02-03T08:01Z 87.3K followers, 28.7K engagements
""DIRTYFREE: Simplified Data-Oriented Programming in the Linux Kernel" (paper) Authors: Yoochan Lee Hyuk Kwon and Thorsten Holz #infosec #Linux https://leeyoochan.github.io/assets/pdf/DirtyFree_NDSS_2026.pdf https://leeyoochan.github.io/assets/pdf/DirtyFree_NDSS_2026.pdf"
X Link 2026-02-03T16:30Z 87.3K followers, [----] engagements
"Airoha Bluetooth RACE vulnerabilities (CVE-2025-20700/20701/20702) Blog post: White paper: Credits Dennis Heinze Frieder Steinmetz (@ERNW_ITSec) #infosec #bluetooth https://static.ernw.de/whitepaper/ERNW_White_Paper_74_1.0.pdf https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/ https://static.ernw.de/whitepaper/ERNW_White_Paper_74_1.0.pdf https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/"
X Link 2026-02-04T16:02Z 87.3K followers, [----] engagements
"Reverse engineering Realtek RTL8761B* Bluetooth chips to make better Bluetooth security tools & classes (slide deck by @XenoKovah) #infosec https://darkmentor.com/publication/2025-11-hardweario/ https://darkmentor.com/publication/2025-11-hardweario/"
X Link 2026-02-05T08:00Z 87.3K followers, 14.3K engagements
"Beginners intro to Linux kernel fuzzing and vulnerability research (2024 blog post series by @slava_moskvin_) Part 1: Part 2: Part 3: #Linux #cybersecurity https://slavamoskvin.com/finding-bugs-in-kernel.-part-2-fuzzing-the-actual-kernel/ https://slavamoskvin.com/finding-bugs-in-kernel.-part-1-crashing-a-vulnerable-driver-with-syzkaller/ https://slavamoskvin.com/hunting-bugs-in-linux-kernel-with-kasan-how-to-use-it-whats-the-benefit/ https://slavamoskvin.com/finding-bugs-in-kernel.-part-2-fuzzing-the-actual-kernel/"
X Link 2026-02-05T16:01Z 87.3K followers, [----] engagements
"Deep dive into how Windows on ARM handles interrupts by Connor McGarr (@33y0re) #Windows #infosec https://connormcgarr.github.io/windows-arm64-interrupts/ https://connormcgarr.github.io/windows-arm64-interrupts/"
X Link 2026-02-06T08:00Z 87.3K followers, [----] engagements
"CVE-2025-3052 explained: running unsigned code during the UEFI boot process Credits @binarly_io #infosec https://www.binarly.io/blog/another-crack-in-the-chain-of-trust https://www.binarly.io/blog/another-crack-in-the-chain-of-trust"
X Link 2026-02-06T16:01Z 87.3K followers, [----] engagements
"Command & Conquer: network architecture exposed attack surface discovered vulnerabilities and exploitation Research by Bryan Alexander and Jordan Whitehead #infosec https://www.atredis.com/blog/2026/1/26/generals https://www.atredis.com/blog/2026/1/26/generals"
X Link 2026-02-07T16:30Z 87.3K followers, [----] engagements
"Unauthenticated RCE in NetSupport Manager by chaining CVE-2025-34164 (heap OOB write) and CVE-2025-34165 (stack OOB read) Credits Fabian Weber (@codewhitesec) #infosec https://code-white.com/blog/2026-01-nsm-rce/ https://code-white.com/blog/2026-01-nsm-rce/"
X Link 2026-02-08T17:00Z 87.3K followers, [----] engagements
"Short beginners introduction to virtual memory #cybersecurity https://nghiant3223.github.io/2025/05/29/fundamental_of_virtual_memory.html https://nghiant3223.github.io/2025/05/29/fundamental_of_virtual_memory.html"
X Link 2026-02-09T16:01Z 87.3K followers, [----] engagements
"Exploiting Linux by abusing page table entries #Linux #infosec https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326 https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326"
X Link 2026-02-10T08:00Z 87.3K followers, 10.9K engagements
"Escalate privileges from a rooted user space (N-EL0) to the highest privilege level in the Secure World (S-EL3) (Android Xiaomi Redmi 11s) (CCC 2025) #infosec https://media.ccc.de/v/39c3-not-to-be-trusted-a-fiasco-in-android-tees https://media.ccc.de/v/39c3-not-to-be-trusted-a-fiasco-in-android-tees"
X Link 2026-02-10T16:30Z 87.3K followers, [----] engagements
"Dirty Pageflags: abusing page table entries for exploiting Linux #Linux #infosec https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326 https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326"
X Link 2026-02-12T16:02Z 87.3K followers, [----] engagements
"MediaTek exploit that lets you write to arbitrary memory via the Download Agent bypassing DA2 signature verification Blog post by @shomykohai #infosec https://shomy.is-a.dev/blog/article/serving-carbonara https://shomy.is-a.dev/blog/article/serving-carbonara"
X Link 2026-02-13T08:00Z 87.3K followers, [----] engagements
"Cybersecurity blog posts writeups papers and tools #infosec https://github.com/0xor0ne/awesome-list https://github.com/0xor0ne/awesome-list"
X Link 2026-02-13T16:02Z 87.3K followers, 19K engagements
"(1/4) Great series on Linux rootkits by @TheXcellerator Part 1: Introduction and Workflow: Part 2: Ftrace and Function Hooking: Part 3: A Backdoor to Root: #Linux #kernel #malware #infosec #cybersecurity https://xcellerator.github.io/posts/linux_rootkits_03/ https://xcellerator.github.io/posts/linux_rootkits_02/ https://xcellerator.github.io/posts/linux_rootkits_01/ https://xcellerator.github.io/posts/linux_rootkits_03/ https://xcellerator.github.io/posts/linux_rootkits_02/ https://xcellerator.github.io/posts/linux_rootkits_01/"
X Link 2023-02-25T19:30Z 87.3K followers, 58.3K engagements
"Great website if you need a quick reference to Linux kernel syscalls (numbers) #Linux https://syscalls.mebeim.net/ https://syscalls.mebeim.net/"
X Link 2023-04-21T16:30Z 87.2K followers, 78K engagements
"Nice series introducing cryptography concepts for beginners (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"
X Link 2023-04-22T18:30Z 87.3K followers, 73.6K engagements
"Nice reading for anyone interested in Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2023-04-23T07:30Z 87.2K followers, 117.5K engagements
"Nice intro for beginners to bluetooth communications reverse engineering (Domyos EL500) Credits @Palantir555 #bluetooth https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/ https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/"
X Link 2023-05-13T18:30Z 87.3K followers, 58.5K engagements
"Reverse engineering the runtime code integrity protection of Call of Duty: Black Ops [--] Blog post by @momo5502 #reverseengineering https://buff.ly/3Xwv5N https://buff.ly/3Xwv5N"
X Link 2023-05-16T11:15Z 87.3K followers, 66.7K engagements
"(1/2) Excellent series by @LordNoteworthy explaining how virtualization on x86 works Intro to Virtualization: VMWare and Full Virtualization using Binary Translation: #virtualization #hacking #infotech #infosec #learning https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/ https://docs.saferwall.com/blog/virtualization-internals-part-1-intro-to-virtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/"
X Link 2023-05-21T07:30Z 87.2K followers, 68.3K engagements
"Nice beginners series by @IntezerLabs on malware reverse engineering Part 1: Part 2: #malware https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2023-05-26T16:30Z 87.3K followers, 61.6K engagements
"Excellent research work for anyone interested in Wi-Fi security MiTM by exploiting cross-layer interactions between WPAs and ICMP #wifi #infosec #cybersecurity #wireless https://csis.gmu.edu/ksun/publications/WiFi_Interception_SP23.pdf https://csis.gmu.edu/ksun/publications/WiFi_Interception_SP23.pdf"
X Link 2023-05-29T08:00Z 87.3K followers, 87.3K engagements
"Excellent series on Windows rootkit development for red teaming Credits @Idov31 Part 1: Part 2: Part 3: Part 4: #windows #driver #kernel #rootkit #redteam https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html"
X Link 2023-06-02T16:30Z 87.3K followers, 86.6K engagements
"Great website if you need a quick reference to Linux kernel syscalls (numbers) #Linux #syscall #kernel https://syscalls.mebeim.net https://syscalls.mebeim.net"
X Link 2023-06-10T18:30Z 87.3K followers, 121.5K engagements
"Excellent introduction to cryptography concepts for beginners (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"
X Link 2023-06-12T08:00Z 87.2K followers, 179.3K engagements
"In case you missed this is a great series by greenluigi1 on car Infotainment system hacking Part 1: Part 2: Part 3: #hacking #automotive #carhacking #infosec #cybersecurity https://programmingwithstyle.com/posts/howihackedmycarpart3/ https://programmingwithstyle.com/posts/howihackedmycarpart2/ https://programmingwithstyle.com/posts/howihackedmycar/ https://programmingwithstyle.com/posts/howihackedmycarpart3/ https://programmingwithstyle.com/posts/howihackedmycarpart2/ https://programmingwithstyle.com/posts/howihackedmycar/"
X Link 2023-06-13T07:00Z 87.3K followers, 86.2K engagements
"Home router hacking presentation at HITB2023 (@NCCGroupInfosec) "Your not so Home Office - SOHO Hacking at Pwn2Own" #soho #router #exploit #embedded #iot #infosec #cybersecurity http://conference.hitb.org/files/hitbsecconf2023ams/materials/D1T1%20-%20Your%20Not%20So%20Home%20Office%20-%20Soho%20Hacking%20at%20Pwn2Own%20-%20McCaulay%20Hudson%20&%20Alex%20Plaskett.pdf http://conference.hitb.org/files/hitbsecconf2023ams/materials/D1T1%20-%20Your%20Not%20So%20Home%20Office%20-%20Soho%20Hacking%20at%20Pwn2Own%20-%20McCaulay%20Hudson%20&%20Alex%20Plaskett.pdf"
X Link 2023-06-16T07:00Z 87.2K followers, 115.8K engagements
"Very useful guide for learning Make (and Makefiles) #make #makefile #infosec #cybersecurity https://makefiletutorial.com https://makefiletutorial.com"
X Link 2023-06-18T18:30Z 87.3K followers, 111.6K engagements
"Excellent blog post on reverse engineering and pwning a Google Home Mini smart speaker. A must read for anyone interested in embedded device security and vulnerability research. #iot #embedded #infosec #cybersecurity https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html"
X Link 2023-06-19T16:30Z 87.3K followers, 101.6K engagements
"Excellent series for learning a bit more about Linux kernel internals and exploitation techniques Credits @_lkmidas Part 1: Part 2: Part 3: #Linux https://lkmidas.github.io/posts/20210205-linux-kernel-pwn-part-3/ https://lkmidas.github.io/posts/20210128-linux-kernel-pwn-part-2/ https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/ https://lkmidas.github.io/posts/20210205-linux-kernel-pwn-part-3/ https://lkmidas.github.io/posts/20210128-linux-kernel-pwn-part-2/ https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/"
X Link 2023-06-25T07:30Z 87.3K followers, 70.1K engagements
"Cool series to learn IoT/embedded devices reverse engineering (credits @Palantir555) Debug Ports: Firmware: Data: Flash: Digging the Firmware: #iot https://buff.ly/3WUY50u https://buff.ly/3WKnhay https://buff.ly/3WRz5r4 https://buff.ly/3WHNOFo https://buff.ly/3WGw513 https://buff.ly/3WUY50u https://buff.ly/3WKnhay https://buff.ly/3WRz5r4 https://buff.ly/3WHNOFo https://buff.ly/3WGw513"
X Link 2023-06-27T11:15Z 87.3K followers, 63.4K engagements
"Here are a few resources for getting started with Satellite hacking and CTFs Satellite Hacking Demystified: Hack-a-sat writeups: Hack-a-sat players corner: #satellite #infosec https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/Satellite-Hacking-Demystified/ https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/Satellite-Hacking-Demystified/"
X Link 2023-08-09T07:00Z 87.2K followers, 60.7K engagements
"Excellent introduction to cryptography concepts for beginners with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"
X Link 2023-08-14T08:01Z 87.2K followers, 84.8K engagements
"Interesting series on how virtualization works (VMware XEN QEMU) Credits @LordNoteworthy Part 1: Part 2: Part 3: Part 4: #virtualization #infotech https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu https://docs.saferwall.com/blog/virtualization-internals-part-3-xen-and-paravirtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/ https://docs.saferwall.com/blog/virtualization-internals-part-1-intro-to-virtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu"
X Link 2023-09-06T18:00Z 87.2K followers, 63.6K engagements
"Beginner introduction to cryptography concepts with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"
X Link 2023-10-10T07:00Z 87.2K followers, 87.2K engagements
"Introduction guide to Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2023-10-12T19:30Z 87.2K followers, 88K engagements
"Windows rootkit development for red teaming Excellent series by @Idov31 Part 1: Part 2: Part 3: Part 4: PArt 5: #windows #driver #kernel #rootkit #redteam https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html"
X Link 2023-10-19T19:30Z 87.3K followers, 61.4K engagements
"Reverse engineering the Brightway (Xiaomi) scooters Interesting blog post for anyone interested in embedded devices reverse engineering #reverseengineering #cybersecurity #infotech https://robocoffee.de/p=436 https://robocoffee.de/p=436"
X Link 2023-10-29T08:30Z 87.2K followers, 70.8K engagements
"List of links to blog posts write-ups and papers related to cybersecurity reverse engineering and exploitation (constantly updated) #cybersecurity #infosec https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.mdref=0xor0ne.xyz https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.mdref=0xor0ne.xyz"
X Link 2023-11-27T16:00Z 87.2K followers, 103.9K engagements
"MikroTik routers reverse engineering and exploitation Excellent work by @hgarrereyn and @__comedian Blog post: Slides (RECon): #iot #mikrotik #cybsersecurity https://github.com/MarginResearch/resources/blob/83e402a86370f7c3acf8bb3ad982c1fee89c9b53/documents/Pulling_MikroTik_into_the_Limelight.pdf https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/ https://github.com/MarginResearch/resources/blob/83e402a86370f7c3acf8bb3ad982c1fee89c9b53/documents/Pulling_MikroTik_into_the_Limelight.pdf https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/"
X Link 2023-12-03T08:30Z 87.3K followers, 56.7K engagements
"Introduction to cryptography concepts for beginners with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ref=0xor0ne.xyz https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ref=0xor0ne.xyz https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ref=0xor0ne.xyz https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ref=0xor0ne.xyz"
X Link 2023-12-05T17:30Z 87.2K followers, 56.3K engagements
""The Linux Kernel Module Programming Guide" Introduction guide to Linux kernel internals and modules development (updated to 5.x kernels) #Linux #kernel #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2023-12-07T08:01Z 87.3K followers, 52.2K engagements
"Call of Duty: Black Ops [--] - Reverse engineering of runtime code integrity protection Writeup by @momo5502 #reverseengineering #infosec https://web.archive.org/web/20230522230748/https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/ https://web.archive.org/web/20230522230748/https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/"
X Link 2023-12-09T08:30Z 87.2K followers, 47.6K engagements
"Beginner intro to cryptography concepts with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"
X Link 2024-02-08T17:30Z 87.2K followers, 32.1K engagements
"Interesting project attempting to reverse engineering the precompiled Wi-Fi stack of ESP32 SoC to recreate an open source version Part 1: Part 2: Repo: #esp32 #infosec https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/"
X Link 2024-03-03T08:30Z 87.3K followers, 33.6K engagements
"Excellent beginners introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-03-21T17:30Z 87.3K followers, 32.6K engagements
"Beginners series for starting with embedded devices reverse engineering Credits @voidstarsec Ghidra setup: Tools: Firmware extraction: #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-03-23T16:30Z 87.2K followers, 33.5K engagements
"Reverse engineering and vulnerability analysis of DJI drones' firmware. A two-parts blog series by @nozominetworks Firmware Analysis: Vulnerability Analysis: Particularly interesting is the chain of weak Wi-Fi password cracking (CVE-2023-6951) followed by the unauthenticated video exfiltration (CVE-2023-6949) #dji #drone https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-1-firmware-analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis"
X Link 2024-04-02T15:09Z 87.2K followers, 43.4K engagements
"Must read guide for anyone starting with Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2024-04-14T18:30Z 87.2K followers, 43.5K engagements
"Nice introduction to Windows kernel exploitation for beginners Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-05-01T12:00Z 87.2K followers, 32.4K engagements
"Getting started with embedded devices reverse engineering (Beginners series) Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-07-24T07:00Z 87.2K followers, 23.3K engagements
"Get started with Satellite hacking and CTFs Satellite Hacking Demystified: Hack-a-sat writeups: Hack-a-sat players corner: #satellite #cybersecurity https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/satellite-hacking-demystified https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/satellite-hacking-demystified"
X Link 2024-07-27T07:30Z 87.2K followers, 36.7K engagements
"Reverse engineering of ESP32's precompiled Wi-Fi stack Part 1: Part 2: Repo: #esp32 #cybersecurity https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/"
X Link 2024-08-10T07:30Z 87.3K followers, 39.9K engagements
"Beginners intro to Linux kernel exploitation (env setup and ret2usr) Part 1: Part 2: #Linux #cybersecurity http://scoding.de/linux-kernel-exploitation-buffer_overflow http://scoding.de/linux-kernel-exploitation-environment http://scoding.de/linux-kernel-exploitation-buffer_overflow http://scoding.de/linux-kernel-exploitation-environment"
X Link 2024-09-10T07:00Z 87.2K followers, 41.5K engagements
"Intro to windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-09-15T16:00Z 87.2K followers, 51.2K engagements
"Beginners intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-09-21T15:30Z 87.2K followers, 65.3K engagements
"Open source Wi-Fi stack for ESP32 SoCs through reverse engineering pre-compiled binary blobs Part 1: Part 2: Repo: #esp32 #cybersecurity https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/"
X Link 2024-09-27T07:00Z 87.2K followers, 38.1K engagements
"Introduction to Linux kernel internals and modules development "The Linux Kernel Module Programming Guide" #Linux #infosec https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2024-09-29T07:30Z 87.2K followers, 34.9K engagements
"Intro to malware reverse engineering Part 1: Part 2: Series by @IntezerLabs #malware #cybersecurity https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2024-10-05T15:30Z 87.2K followers, 36.3K engagements
"Collection of write-ups blog posts and papers related to cybersecurity reverse engineering and exploitation #infosec #cybersecurity https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md"
X Link 2024-10-06T07:30Z 87.2K followers, 33.9K engagements
"Intro for beginners to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-10-29T08:00Z 87.3K followers, 31.7K engagements
"Windows kernel exploitation beginners introduction Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-10-30T16:00Z 87.2K followers, 31.9K engagements
"Introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-11-24T08:30Z 87.2K followers, 28.8K engagements
"Intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-12-25T16:00Z 87.2K followers, 34.4K engagements
"Easy introduction to cryptography concept with practical examples in Linux (openssl) Part 1: Part 2: Part 3: Part 4: Credits @sergioprado #cryptography #infosec https://sergioprado.blog/what-are-random-numbers-and-how-they-are-managed-on-linux/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/what-are-random-numbers-and-how-they-are-managed-on-linux/"
X Link 2024-12-31T08:00Z 87.2K followers, 43.2K engagements
"Reverse engineering and malware analysis series Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2025-01-26T17:00Z 87.2K followers, 34.3K engagements
"Iptables for local privilege escalation #Linux #infosec https://www.shielder.com/blog/2024/09/a-journey-from-sudo-iptables-to-local-privilege-escalation/ https://www.shielder.com/blog/2024/09/a-journey-from-sudo-iptables-to-local-privilege-escalation/"
X Link 2025-02-01T16:30Z 87.3K followers, 33.3K engagements
"Intercepting Linux system calls #cybersecurity #Linux https://blog.mggross.com/intercepting-syscalls/ https://blog.mggross.com/intercepting-syscalls/"
X Link 2025-02-06T08:00Z 87.2K followers, 29.5K engagements
"Nice introduction to Linux kernel rootkits #Linux #infosec https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"
X Link 2025-02-15T16:30Z 87.2K followers, 40.4K engagements
"Introduction to reverse engineering and malware analysis Part 1: Part 2: #malware #cybersecurity https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2025-02-16T08:30Z 87.2K followers, 36.5K engagements
"Intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2025-02-18T16:30Z 87.2K followers, 36.7K engagements
"Introduction for beginners to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #cybersecurity https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2025-03-18T16:30Z 87.2K followers, 25.7K engagements
"Beginners introduction to Linux kernel rootkits #Linux #cybersecurity https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"
X Link 2025-03-19T16:00Z 87.2K followers, 36.2K engagements
"Reverse engineering and malware analysis (introduction for beginners) Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2025-03-22T16:30Z 87.2K followers, 39.4K engagements
"Introdution for beginners to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2025-03-23T08:30Z 87.2K followers, 36.2K engagements
"Write-ups blog posts and papers related to cybersecurity reverse engineering and exploitation #infosec #cybersecurity https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md"
X Link 2025-03-30T07:30Z 87.2K followers, 32.1K engagements
"Reverse engineering and security analysis of an ESP32 based IoT device Blog post by James Warner (@jmswrnr) #esp32 #infosec https://jmswrnr.com/blog/hacking-a-smart-home-device https://jmswrnr.com/blog/hacking-a-smart-home-device"
X Link 2025-04-13T07:30Z 87.2K followers, 23.7K engagements
"Short introduction to Linux kernel rootkits #Linux #cybersecurity https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"
X Link 2025-04-19T15:30Z 87.2K followers, 28.8K engagements
"Valve Anti-Cheat (VAC) solution reverse engineering #infosec #reverseengineering https://codeneverdies.github.io/posts/gh-2/ https://codeneverdies.github.io/posts/gh-2/"
X Link 2025-05-17T15:30Z 87.2K followers, 32.7K engagements
"Linux kernel rootkits: beginners introduction #Linux #infosec https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"
X Link 2025-05-20T07:00Z 87.2K followers, 24.8K engagements
"Windows kernel exploitation for beginners Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2025-06-21T15:30Z 87.2K followers, 45.2K engagements
"Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras by @Watchful_IP #embedded #cybersecurity https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html"
X Link 2025-09-21T16:00Z 87.2K followers, 30.5K engagements
Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
/creator/x::0xor0ne