Dark | Light
# ![@0xor0ne Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::1293289704843075586.png) @0xor0ne 0xor0ne

0xor0ne posts on X about credits, tplink, if you, posts the most. They currently have [------] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours.

### Engagements: [------] [#](/creator/twitter::1293289704843075586/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1293289704843075586/c:line/m:interactions.svg)

- [--] Week [------] +60%
- [--] Month [-------] -25%
- [--] Months [---------] +41%
- [--] Year [---------] -53%

### Mentions: [--] [#](/creator/twitter::1293289704843075586/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1293289704843075586/c:line/m:posts_active.svg)

- [--] Week [--] +76%
- [--] Month [--] +20%
- [--] Months [---] +55%
- [--] Year [---] -8.50%

### Followers: [------] [#](/creator/twitter::1293289704843075586/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1293289704843075586/c:line/m:followers.svg)

- [--] Week [------] +0.15%
- [--] Month [------] +1.50%
- [--] Months [------] +8.80%
- [--] Year [------] +21%

### CreatorRank: [-------] [#](/creator/twitter::1293289704843075586/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1293289704843075586/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[technology brands](/list/technology-brands)  10.38% [stocks](/list/stocks)  1.89% [gaming](/list/gaming)  1.89% [countries](/list/countries)  0.94%

**Social topic influence**
[credits](/topic/credits) 24.53%, [tplink](/topic/tplink) #46, [if you](/topic/if-you) 3.77%, [posts](/topic/posts) #76, [iot](/topic/iot) 2.83%, [android](/topic/android) 1.89%, [firmware](/topic/firmware) #27, [$googl](/topic/$googl) 1.89%, [level](/topic/level) 1.89%, [list](/topic/list) 1.89%

**Top accounts mentioned or mentioned by**
[@transilienceai](/creator/undefined) [@sergioprado](/creator/undefined) [@voidstarsec](/creator/undefined) [@intezerlabs](/creator/undefined) [@quarkslab](/creator/undefined) [@limitedresults](/creator/undefined) [@watchfulip](/creator/undefined) [@palantir555](/creator/undefined) [@momo5502](/creator/undefined) [@lordnoteworthy](/creator/undefined) [@idov31](/creator/undefined) [@cybernews_alert](/creator/undefined) [@natashenka](/creator/undefined) [@sethjenkins](/creator/undefined) [@neodyme](/creator/undefined) [@hyprdude](/creator/undefined) [@evilsocket](/creator/undefined) [@landaire](/creator/undefined) [@qkaiser](/creator/undefined) [@matheusgarbelin](/creator/undefined)

**Top assets mentioned**
[Alphabet Inc Class A (GOOGL)](/topic/$googl)
### Top Social Posts
Top posts by engagements in the last [--] hours

"Great 3-parts series on 0-click exploit chain targeting Android Pixel [--] Arbitrary code execution in mediacodec - kernel privilege escalation Part 1: Part 2: Part 3: Research by Natalie Silvanovich (@natashenka) and Seth Jenkins (@__sethJenkins) #infosec https://projectzero.google/2026/01/pixel-0-click-part-3.html https://projectzero.google/2026/01/pixel-0-click-part-2.html https://projectzero.google/2026/01/pixel-0-click-part-1.html https://projectzero.google/2026/01/pixel-0-click-part-3.html https://projectzero.google/2026/01/pixel-0-click-part-2.html"  
[X Link](https://x.com/0xor0ne/status/2021619971084730732)  2026-02-11T16:18Z 87.3K followers, [----] engagements


"Bruteforcing ECC and dumping firmware from a Potensic Atom [--] drone Research by @Neodyme #infosec https://neodyme.io/en/blog/drone_hacking_part_1/#intro https://neodyme.io/en/blog/drone_hacking_part_1/#intro"  
[X Link](https://x.com/0xor0ne/status/2015469917831618977)  2026-01-25T17:00Z 87.1K followers, 11.1K engagements


"Exploiting vulnerabilities in MediaTek MT76xx and MT7915 Wifi chipset family Credits @hyprdude #infosec https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html"  
[X Link](https://x.com/0xor0ne/status/2016783546619191409)  2026-01-29T08:00Z 87.2K followers, 12.8K engagements


"Reverse engineering and dumping firmware from a low-cost smartwatch by Damien Cauquil (@quarkslab) #infosec https://blog.quarkslab.com/modern-tale-blinkenlights.html https://blog.quarkslab.com/modern-tale-blinkenlights.html"  
[X Link](https://x.com/0xor0ne/status/2017145953950585282)  2026-01-30T08:00Z 87.1K followers, 18.5K engagements


"TP-Link Tapo C200 IP camera: security analysis and exploitation by @evilsocket #infosec #iot https://www.evilsocket.net/2025/12/18/TP-Link-Tapo-C200-Hardcoded-Keys-Buffer-Overflows-and-Privacy-in-the-Era-of-AI-Assisted-Reverse-Engineering/ https://www.evilsocket.net/2025/12/18/TP-Link-Tapo-C200-Hardcoded-Keys-Buffer-Overflows-and-Privacy-in-the-Era-of-AI-Assisted-Reverse-Engineering/"  
[X Link](https://x.com/0xor0ne/status/2011710144606781535)  2026-01-15T08:00Z 87.3K followers, 142.2K engagements


"Deep-dive by @landaire into reverse engineering Splinter Cell's (2002) .lin Unreal Engine [--] archive format #ReverseEngineering https://landaire.net/a-file-format-uncracked-for-20-years/ https://landaire.net/a-file-format-uncracked-for-20-years/"  
[X Link](https://x.com/0xor0ne/status/2021857072824938577)  2026-02-12T08:01Z 87.3K followers, [----] engagements


"Just a reminder of a few great tools for firmware unpacking repacking and analysis binwalk: EMBA: unblob: ofrak: #iot #embedded #reverseengineering #infosec https://github.com/redballoonsecurity/ofrak https://github.com/onekey-sec/unblob https://github.com/e-m-b-a/emba https://github.com/ReFirmLabs/binwalk https://github.com/redballoonsecurity/ofrak https://github.com/onekey-sec/unblob https://github.com/e-m-b-a/emba https://github.com/ReFirmLabs/binwalk"  
[X Link](https://x.com/0xor0ne/status/1619251448818155520)  2023-01-28T08:30Z 87.3K followers, 95K engagements


"Excellent free book for anyone interested in Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"  
[X Link](https://x.com/0xor0ne/status/1667207618220138496)  2023-06-09T16:30Z 87.3K followers, 227.8K engagements


"Great free guide for learninig Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"  
[X Link](https://x.com/0xor0ne/status/1690430489314594816)  2023-08-12T18:30Z 87.2K followers, 65.7K engagements


"Excellent research on reverse engineering and pwning a Google Home Mini smart speaker. A must read if you are interested in embedded device security and vulnerability research. #iot #embedded #infosec #cybersecurity https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html"  
[X Link](https://x.com/0xor0ne/status/1716775318839537703)  2023-10-24T11:15Z 87.2K followers, 54.8K engagements


"If you are a beginner and interested in malware analysis this is an excellent introduction series by @IntezerLabs Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"  
[X Link](https://x.com/0xor0ne/status/1746253336636956993)  2024-01-13T19:30Z 87.3K followers, 46K engagements


"Introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #cybersecurity https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"  
[X Link](https://x.com/0xor0ne/status/1886097307638047009)  2025-02-02T17:00Z 87.3K followers, 40.8K engagements


"TP-Link Tapo C200 reverse engineering and exploitation Credits @qkaiser #infosec #embedded https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/ https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/"  
[X Link](https://x.com/0xor0ne/status/2016187059593949391)  2026-01-27T16:30Z 87.2K followers, 29.9K engagements


"Very cool repo for learning how to use rust for offensive security https://github.com/trickster0/OffensiveRust https://github.com/trickster0/OffensiveRust"  
[X Link](https://x.com/0xor0ne/status/1604891873100832768)  2022-12-19T17:30Z 87.3K followers, 45.7K engagements


"If you're interested in bluetooth low level hacking take a look at this cool project by Matheus Eduardo Garbelini (@MatheusGarbelin) Active Bluetooth BR/EDR Sniffer/Injector: #bluetooth #esp32 #espressif #hacking #infosec https://github.com/Matheus-Garbelini/esp32_bluetooth_classic_sniffer https://github.com/Matheus-Garbelini/esp32_bluetooth_classic_sniffer"  
[X Link](https://x.com/0xor0ne/status/1606341450425311232)  2022-12-23T17:30Z 87.3K followers, 78.6K engagements


"Cool secure boot bypass by fault injection in ESP32 CPUs by @LimitedResults #embedded #iot #hardware #faultinjection #infosec https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/ https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/"  
[X Link](https://x.com/0xor0ne/status/1610327674374717440)  2023-01-03T17:30Z 87.3K followers, 69.3K engagements


"Secure boot bypass by fault injection in (Espressif) ESP32 CPUs Credits @LimitedResults #embedded #iot #hardware #faultinjection #infosec https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/ https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/"  
[X Link](https://x.com/0xor0ne/status/1662722898660917248)  2023-05-28T07:30Z 87.3K followers, 65K engagements


"Cybersecurity related awesome list: blog posts write-ups papers and tools related to cybersecurity reverse engineering and exploitation #cybersecurity #infosec https://github.com/0xor0ne/awesome-list https://github.com/0xor0ne/awesome-list"  
[X Link](https://x.com/anyuser/status/1928059503238324563)  2025-05-29T12:03Z 87.3K followers, 52.4K engagements


"Valve Anti-Cheat (VAC) reverse engineering #infosec https://codeneverdies.github.io/posts/gh-2/ https://codeneverdies.github.io/posts/gh-2/"  
[X Link](https://x.com/0xor0ne/status/1971960572171124812)  2025-09-27T15:30Z 87.3K followers, 48.8K engagements


"Heap overflow in MediaTek's DA2 USB file download handler that gives code execution on (Carbonara) patched V6 devices Research by @r0rt1z2 and shomy #infosec https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/ https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/"  
[X Link](https://x.com/anyuser/status/2017636519947743368)  2026-01-31T16:30Z 87.3K followers, [----] engagements


"Clang Hardening Cheat Sheet (2026) Credits @0xTRIKKSS and @bcreusillet (@quarkslab) #infosec https://blog.quarkslab.com/clang-hardening-cheat-sheet-ten-years-later.html https://blog.quarkslab.com/clang-hardening-cheat-sheet-ten-years-later.html"  
[X Link](https://x.com/0xor0ne/status/2018006846569648474)  2026-02-01T17:01Z 87.3K followers, [----] engagements


"TP-Link (Tapo) C210 cloud camera: bootloader vulnerability and firmware decryption by @Watchful_IP #infosec https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html"  
[X Link](https://x.com/0xor0ne/status/2018354617931768124)  2026-02-02T16:03Z 87.3K followers, 15.1K engagements


""From Zero to QEMU: A journey into system emulation" (slide deck by Antonio Nappa) #infosec #qemu https://docs.google.com/presentation/d/1g0hTGKXWf6EvyUIjw4qomJ5CGrV245nbGn5p-yNu1Sc/editslide=id.g357295fe39c_0_3#slide=id.g357295fe39c_0_3 https://docs.google.com/presentation/d/1g0hTGKXWf6EvyUIjw4qomJ5CGrV245nbGn5p-yNu1Sc/editslide=id.g357295fe39c_0_3#slide=id.g357295fe39c_0_3"  
[X Link](https://x.com/0xor0ne/status/2018595582076473401)  2026-02-03T08:01Z 87.3K followers, 28.7K engagements


""DIRTYFREE: Simplified Data-Oriented Programming in the Linux Kernel" (paper) Authors: Yoochan Lee Hyuk Kwon and Thorsten Holz #infosec #Linux https://leeyoochan.github.io/assets/pdf/DirtyFree_NDSS_2026.pdf https://leeyoochan.github.io/assets/pdf/DirtyFree_NDSS_2026.pdf"  
[X Link](https://x.com/0xor0ne/status/2018723757104202027)  2026-02-03T16:30Z 87.3K followers, [----] engagements


"Airoha Bluetooth RACE vulnerabilities (CVE-2025-20700/20701/20702) Blog post: White paper: Credits Dennis Heinze Frieder Steinmetz (@ERNW_ITSec) #infosec #bluetooth https://static.ernw.de/whitepaper/ERNW_White_Paper_74_1.0.pdf https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/ https://static.ernw.de/whitepaper/ERNW_White_Paper_74_1.0.pdf https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/"  
[X Link](https://x.com/0xor0ne/status/2019079118717882717)  2026-02-04T16:02Z 87.3K followers, [----] engagements


"Reverse engineering Realtek RTL8761B* Bluetooth chips to make better Bluetooth security tools & classes (slide deck by @XenoKovah) #infosec https://darkmentor.com/publication/2025-11-hardweario/ https://darkmentor.com/publication/2025-11-hardweario/"  
[X Link](https://x.com/0xor0ne/status/2019320295308341375)  2026-02-05T08:00Z 87.3K followers, 14.3K engagements


"Beginners intro to Linux kernel fuzzing and vulnerability research (2024 blog post series by @slava_moskvin_) Part 1: Part 2: Part 3: #Linux #cybersecurity https://slavamoskvin.com/finding-bugs-in-kernel.-part-2-fuzzing-the-actual-kernel/ https://slavamoskvin.com/finding-bugs-in-kernel.-part-1-crashing-a-vulnerable-driver-with-syzkaller/ https://slavamoskvin.com/hunting-bugs-in-linux-kernel-with-kasan-how-to-use-it-whats-the-benefit/ https://slavamoskvin.com/finding-bugs-in-kernel.-part-2-fuzzing-the-actual-kernel/"  
[X Link](https://x.com/0xor0ne/status/2019441325595152862)  2026-02-05T16:01Z 87.3K followers, [----] engagements


"Deep dive into how Windows on ARM handles interrupts by Connor McGarr (@33y0re) #Windows #infosec https://connormcgarr.github.io/windows-arm64-interrupts/ https://connormcgarr.github.io/windows-arm64-interrupts/"  
[X Link](https://x.com/0xor0ne/status/2019682667474592109)  2026-02-06T08:00Z 87.3K followers, [----] engagements


"CVE-2025-3052 explained: running unsigned code during the UEFI boot process Credits @binarly_io #infosec https://www.binarly.io/blog/another-crack-in-the-chain-of-trust https://www.binarly.io/blog/another-crack-in-the-chain-of-trust"  
[X Link](https://x.com/anyuser/status/2019803705537597562)  2026-02-06T16:01Z 87.3K followers, [----] engagements


"Command & Conquer: network architecture exposed attack surface discovered vulnerabilities and exploitation Research by Bryan Alexander and Jordan Whitehead #infosec https://www.atredis.com/blog/2026/1/26/generals https://www.atredis.com/blog/2026/1/26/generals"  
[X Link](https://x.com/0xor0ne/status/2020173234604236897)  2026-02-07T16:30Z 87.3K followers, [----] engagements


"Unauthenticated RCE in NetSupport Manager by chaining CVE-2025-34164 (heap OOB write) and CVE-2025-34165 (stack OOB read) Credits Fabian Weber (@codewhitesec) #infosec https://code-white.com/blog/2026-01-nsm-rce/ https://code-white.com/blog/2026-01-nsm-rce/"  
[X Link](https://x.com/0xor0ne/status/2020543284297281727)  2026-02-08T17:00Z 87.3K followers, [----] engagements


"Short beginners introduction to virtual memory #cybersecurity https://nghiant3223.github.io/2025/05/29/fundamental_of_virtual_memory.html https://nghiant3223.github.io/2025/05/29/fundamental_of_virtual_memory.html"  
[X Link](https://x.com/0xor0ne/status/2020890806840590559)  2026-02-09T16:01Z 87.3K followers, [----] engagements


"Exploiting Linux by abusing page table entries #Linux #infosec https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326 https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326"  
[X Link](https://x.com/0xor0ne/status/2021132261588881765)  2026-02-10T08:00Z 87.3K followers, 10.9K engagements


"Escalate privileges from a rooted user space (N-EL0) to the highest privilege level in the Secure World (S-EL3) (Android Xiaomi Redmi 11s) (CCC 2025) #infosec https://media.ccc.de/v/39c3-not-to-be-trusted-a-fiasco-in-android-tees https://media.ccc.de/v/39c3-not-to-be-trusted-a-fiasco-in-android-tees"  
[X Link](https://x.com/0xor0ne/status/2021260593978593432)  2026-02-10T16:30Z 87.3K followers, [----] engagements


"Dirty Pageflags: abusing page table entries for exploiting Linux #Linux #infosec https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326 https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326"  
[X Link](https://x.com/0xor0ne/status/2021978129317638628)  2026-02-12T16:02Z 87.3K followers, [----] engagements


"MediaTek exploit that lets you write to arbitrary memory via the Download Agent bypassing DA2 signature verification Blog post by @shomykohai #infosec https://shomy.is-a.dev/blog/article/serving-carbonara https://shomy.is-a.dev/blog/article/serving-carbonara"  
[X Link](https://x.com/0xor0ne/status/2022219416595755054)  2026-02-13T08:00Z 87.3K followers, [----] engagements


"Cybersecurity blog posts writeups papers and tools #infosec https://github.com/0xor0ne/awesome-list https://github.com/0xor0ne/awesome-list"  
[X Link](https://x.com/0xor0ne/status/2022340634669920335)  2026-02-13T16:02Z 87.3K followers, 19K engagements


"(1/4) Great series on Linux rootkits by @TheXcellerator Part 1: Introduction and Workflow: Part 2: Ftrace and Function Hooking: Part 3: A Backdoor to Root: #Linux #kernel #malware #infosec #cybersecurity https://xcellerator.github.io/posts/linux_rootkits_03/ https://xcellerator.github.io/posts/linux_rootkits_02/ https://xcellerator.github.io/posts/linux_rootkits_01/ https://xcellerator.github.io/posts/linux_rootkits_03/ https://xcellerator.github.io/posts/linux_rootkits_02/ https://xcellerator.github.io/posts/linux_rootkits_01/"  
[X Link](https://x.com/0xor0ne/status/1629564428785000448)  2023-02-25T19:30Z 87.3K followers, 58.3K engagements


"Great website if you need a quick reference to Linux kernel syscalls (numbers) #Linux https://syscalls.mebeim.net/ https://syscalls.mebeim.net/"  
[X Link](https://x.com/0xor0ne/status/1649450442437406725)  2023-04-21T16:30Z 87.2K followers, 78K engagements


"Nice series introducing cryptography concepts for beginners (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"  
[X Link](https://x.com/0xor0ne/status/1649843017249964032)  2023-04-22T18:30Z 87.3K followers, 73.6K engagements


"Nice reading for anyone interested in Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"  
[X Link](https://x.com/0xor0ne/status/1650039320449785857)  2023-04-23T07:30Z 87.2K followers, 117.5K engagements


"Nice intro for beginners to bluetooth communications reverse engineering (Domyos EL500) Credits @Palantir555 #bluetooth https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/ https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/"  
[X Link](https://x.com/0xor0ne/status/1657453213010784258)  2023-05-13T18:30Z 87.3K followers, 58.5K engagements


"Reverse engineering the runtime code integrity protection of Call of Duty: Black Ops [--] Blog post by @momo5502 #reverseengineering https://buff.ly/3Xwv5N https://buff.ly/3Xwv5N"  
[X Link](https://x.com/0xor0ne/status/1658430857508519936)  2023-05-16T11:15Z 87.3K followers, 66.7K engagements


"(1/2) Excellent series by @LordNoteworthy explaining how virtualization on x86 works Intro to Virtualization: VMWare and Full Virtualization using Binary Translation: #virtualization #hacking #infotech #infosec #learning https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/ https://docs.saferwall.com/blog/virtualization-internals-part-1-intro-to-virtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/"  
[X Link](https://x.com/0xor0ne/status/1660186185405276160)  2023-05-21T07:30Z 87.2K followers, 68.3K engagements


"Nice beginners series by @IntezerLabs on malware reverse engineering Part 1: Part 2: #malware https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"  
[X Link](https://x.com/0xor0ne/status/1662134193059426305)  2023-05-26T16:30Z 87.3K followers, 61.6K engagements


"Excellent research work for anyone interested in Wi-Fi security MiTM by exploiting cross-layer interactions between WPAs and ICMP #wifi #infosec #cybersecurity #wireless https://csis.gmu.edu/ksun/publications/WiFi_Interception_SP23.pdf https://csis.gmu.edu/ksun/publications/WiFi_Interception_SP23.pdf"  
[X Link](https://x.com/0xor0ne/status/1663092875284840449)  2023-05-29T08:00Z 87.3K followers, 87.3K engagements


"Excellent series on Windows rootkit development for red teaming Credits @Idov31 Part 1: Part 2: Part 3: Part 4: #windows #driver #kernel #rootkit #redteam https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html"  
[X Link](https://x.com/0xor0ne/status/1664670822718373888)  2023-06-02T16:30Z 87.3K followers, 86.6K engagements


"Great website if you need a quick reference to Linux kernel syscalls (numbers) #Linux #syscall #kernel https://syscalls.mebeim.net https://syscalls.mebeim.net"  
[X Link](https://x.com/0xor0ne/status/1667600029643571203)  2023-06-10T18:30Z 87.3K followers, 121.5K engagements


"Excellent introduction to cryptography concepts for beginners (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"  
[X Link](https://x.com/0xor0ne/status/1668166398865022978)  2023-06-12T08:00Z 87.2K followers, 179.3K engagements


"In case you missed this is a great series by greenluigi1 on car Infotainment system hacking Part 1: Part 2: Part 3: #hacking #automotive #carhacking #infosec #cybersecurity https://programmingwithstyle.com/posts/howihackedmycarpart3/ https://programmingwithstyle.com/posts/howihackedmycarpart2/ https://programmingwithstyle.com/posts/howihackedmycar/ https://programmingwithstyle.com/posts/howihackedmycarpart3/ https://programmingwithstyle.com/posts/howihackedmycarpart2/ https://programmingwithstyle.com/posts/howihackedmycar/"  
[X Link](https://x.com/0xor0ne/status/1668513769750769665)  2023-06-13T07:00Z 87.3K followers, 86.2K engagements


"Home router hacking presentation at HITB2023 (@NCCGroupInfosec) "Your not so Home Office - SOHO Hacking at Pwn2Own" #soho #router #exploit #embedded #iot #infosec #cybersecurity http://conference.hitb.org/files/hitbsecconf2023ams/materials/D1T1%20-%20Your%20Not%20So%20Home%20Office%20-%20Soho%20Hacking%20at%20Pwn2Own%20-%20McCaulay%20Hudson%20&%20Alex%20Plaskett.pdf http://conference.hitb.org/files/hitbsecconf2023ams/materials/D1T1%20-%20Your%20Not%20So%20Home%20Office%20-%20Soho%20Hacking%20at%20Pwn2Own%20-%20McCaulay%20Hudson%20&%20Alex%20Plaskett.pdf"  
[X Link](https://x.com/anyuser/status/1669600918617169928)  2023-06-16T07:00Z 87.2K followers, 115.8K engagements


"Very useful guide for learning Make (and Makefiles) #make #makefile #infosec #cybersecurity https://makefiletutorial.com https://makefiletutorial.com"  
[X Link](https://x.com/0xor0ne/status/1670499134644670471)  2023-06-18T18:30Z 87.3K followers, 111.6K engagements


"Excellent blog post on reverse engineering and pwning a Google Home Mini smart speaker. A must read for anyone interested in embedded device security and vulnerability research. #iot #embedded #infosec #cybersecurity https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html"  
[X Link](https://x.com/0xor0ne/status/1670831432091009024)  2023-06-19T16:30Z 87.3K followers, 101.6K engagements


"Excellent series for learning a bit more about Linux kernel internals and exploitation techniques Credits @_lkmidas Part 1: Part 2: Part 3: #Linux https://lkmidas.github.io/posts/20210205-linux-kernel-pwn-part-3/ https://lkmidas.github.io/posts/20210128-linux-kernel-pwn-part-2/ https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/ https://lkmidas.github.io/posts/20210205-linux-kernel-pwn-part-3/ https://lkmidas.github.io/posts/20210128-linux-kernel-pwn-part-2/ https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/"  
[X Link](https://x.com/0xor0ne/status/1672869767827406848)  2023-06-25T07:30Z 87.3K followers, 70.1K engagements


"Cool series to learn IoT/embedded devices reverse engineering (credits @Palantir555) Debug Ports: Firmware: Data: Flash: Digging the Firmware: #iot https://buff.ly/3WUY50u https://buff.ly/3WKnhay https://buff.ly/3WRz5r4 https://buff.ly/3WHNOFo https://buff.ly/3WGw513 https://buff.ly/3WUY50u https://buff.ly/3WKnhay https://buff.ly/3WRz5r4 https://buff.ly/3WHNOFo https://buff.ly/3WGw513"  
[X Link](https://x.com/0xor0ne/status/1673651159427416064)  2023-06-27T11:15Z 87.3K followers, 63.4K engagements


"Here are a few resources for getting started with Satellite hacking and CTFs Satellite Hacking Demystified: Hack-a-sat writeups: Hack-a-sat players corner: #satellite #infosec https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/Satellite-Hacking-Demystified/ https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/Satellite-Hacking-Demystified/"  
[X Link](https://x.com/0xor0ne/status/1689169806119882752)  2023-08-09T07:00Z 87.2K followers, 60.7K engagements


"Excellent introduction to cryptography concepts for beginners with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"  
[X Link](https://x.com/0xor0ne/status/1690996983064895489)  2023-08-14T08:01Z 87.2K followers, 84.8K engagements


"Interesting series on how virtualization works (VMware XEN QEMU) Credits @LordNoteworthy Part 1: Part 2: Part 3: Part 4: #virtualization #infotech https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu https://docs.saferwall.com/blog/virtualization-internals-part-3-xen-and-paravirtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/ https://docs.saferwall.com/blog/virtualization-internals-part-1-intro-to-virtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu"  
[X Link](https://x.com/0xor0ne/status/1699482783557534073)  2023-09-06T18:00Z 87.2K followers, 63.6K engagements


"Beginner introduction to cryptography concepts with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"  
[X Link](https://x.com/0xor0ne/status/1711637730692587612)  2023-10-10T07:00Z 87.2K followers, 87.2K engagements


"Introduction guide to Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"  
[X Link](https://x.com/0xor0ne/status/1712551261780742440)  2023-10-12T19:30Z 87.2K followers, 88K engagements


"Windows rootkit development for red teaming Excellent series by @Idov31 Part 1: Part 2: Part 3: Part 4: PArt 5: #windows #driver #kernel #rootkit #redteam https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html"  
[X Link](https://x.com/0xor0ne/status/1715087946427105415)  2023-10-19T19:30Z 87.3K followers, 61.4K engagements


"Reverse engineering the Brightway (Xiaomi) scooters Interesting blog post for anyone interested in embedded devices reverse engineering #reverseengineering #cybersecurity #infotech https://robocoffee.de/p=436 https://robocoffee.de/p=436"  
[X Link](https://x.com/0xor0ne/status/1718545720481845594)  2023-10-29T08:30Z 87.2K followers, 70.8K engagements


"List of links to blog posts write-ups and papers related to cybersecurity reverse engineering and exploitation (constantly updated) #cybersecurity #infosec https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.mdref=0xor0ne.xyz https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.mdref=0xor0ne.xyz"  
[X Link](https://x.com/0xor0ne/status/1729168430501130378)  2023-11-27T16:00Z 87.2K followers, 103.9K engagements


"MikroTik routers reverse engineering and exploitation Excellent work by @hgarrereyn and @__comedian Blog post: Slides (RECon): #iot #mikrotik #cybsersecurity https://github.com/MarginResearch/resources/blob/83e402a86370f7c3acf8bb3ad982c1fee89c9b53/documents/Pulling_MikroTik_into_the_Limelight.pdf https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/ https://github.com/MarginResearch/resources/blob/83e402a86370f7c3acf8bb3ad982c1fee89c9b53/documents/Pulling_MikroTik_into_the_Limelight.pdf https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/"  
[X Link](https://x.com/0xor0ne/status/1731229299384984022)  2023-12-03T08:30Z 87.3K followers, 56.7K engagements


"Introduction to cryptography concepts for beginners with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ref=0xor0ne.xyz https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ref=0xor0ne.xyz https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ref=0xor0ne.xyz https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ref=0xor0ne.xyz"  
[X Link](https://x.com/0xor0ne/status/1732090090887766487)  2023-12-05T17:30Z 87.2K followers, 56.3K engagements


""The Linux Kernel Module Programming Guide" Introduction guide to Linux kernel internals and modules development (updated to 5.x kernels) #Linux #kernel #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"  
[X Link](https://x.com/0xor0ne/status/1732671539579871273)  2023-12-07T08:01Z 87.3K followers, 52.2K engagements


"Call of Duty: Black Ops [--] - Reverse engineering of runtime code integrity protection Writeup by @momo5502 #reverseengineering #infosec https://web.archive.org/web/20230522230748/https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/ https://web.archive.org/web/20230522230748/https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/"  
[X Link](https://x.com/0xor0ne/status/1733403626385625346)  2023-12-09T08:30Z 87.2K followers, 47.6K engagements


"Beginner intro to cryptography concepts with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"  
[X Link](https://x.com/0xor0ne/status/1755645237358104855)  2024-02-08T17:30Z 87.2K followers, 32.1K engagements


"Interesting project attempting to reverse engineering the precompiled Wi-Fi stack of ESP32 SoC to recreate an open source version Part 1: Part 2: Repo: #esp32 #infosec https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/"  
[X Link](https://x.com/0xor0ne/status/1764206593799807015)  2024-03-03T08:30Z 87.3K followers, 33.6K engagements


"Excellent beginners introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"  
[X Link](https://x.com/0xor0ne/status/1770865469899030673)  2024-03-21T17:30Z 87.3K followers, 32.6K engagements


"Beginners series for starting with embedded devices reverse engineering Credits @voidstarsec Ghidra setup: Tools: Firmware extraction: #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"  
[X Link](https://x.com/0xor0ne/status/1771575136677659065)  2024-03-23T16:30Z 87.2K followers, 33.5K engagements


"Reverse engineering and vulnerability analysis of DJI drones' firmware. A two-parts blog series by @nozominetworks Firmware Analysis: Vulnerability Analysis: Particularly interesting is the chain of weak Wi-Fi password cracking (CVE-2023-6951) followed by the unauthenticated video exfiltration (CVE-2023-6949) #dji #drone https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-1-firmware-analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis"  
[X Link](https://x.com/anyuser/status/1775178741401985462)  2024-04-02T15:09Z 87.2K followers, 43.4K engagements


"Must read guide for anyone starting with Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"  
[X Link](https://x.com/0xor0ne/status/1779577886875201737)  2024-04-14T18:30Z 87.2K followers, 43.5K engagements


"Nice introduction to Windows kernel exploitation for beginners Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"  
[X Link](https://x.com/0xor0ne/status/1785640468178407812)  2024-05-01T12:00Z 87.2K followers, 32.4K engagements


"Getting started with embedded devices reverse engineering (Beginners series) Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"  
[X Link](https://x.com/0xor0ne/status/1816005412639944715)  2024-07-24T07:00Z 87.2K followers, 23.3K engagements


"Get started with Satellite hacking and CTFs Satellite Hacking Demystified: Hack-a-sat writeups: Hack-a-sat players corner: #satellite #cybersecurity https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/satellite-hacking-demystified https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/satellite-hacking-demystified"  
[X Link](https://x.com/0xor0ne/status/1817100119361060948)  2024-07-27T07:30Z 87.2K followers, 36.7K engagements


"Reverse engineering of ESP32's precompiled Wi-Fi stack Part 1: Part 2: Repo: #esp32 #cybersecurity https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/"  
[X Link](https://x.com/0xor0ne/status/1822173551706685850)  2024-08-10T07:30Z 87.3K followers, 39.9K engagements


"Beginners intro to Linux kernel exploitation (env setup and ret2usr) Part 1: Part 2: #Linux #cybersecurity http://scoding.de/linux-kernel-exploitation-buffer_overflow http://scoding.de/linux-kernel-exploitation-environment http://scoding.de/linux-kernel-exploitation-buffer_overflow http://scoding.de/linux-kernel-exploitation-environment"  
[X Link](https://x.com/0xor0ne/status/1833400105803637166)  2024-09-10T07:00Z 87.2K followers, 41.5K engagements


"Intro to windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"  
[X Link](https://x.com/0xor0ne/status/1835347968913821697)  2024-09-15T16:00Z 87.2K followers, 51.2K engagements


"Beginners intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"  
[X Link](https://x.com/0xor0ne/status/1837514650193105207)  2024-09-21T15:30Z 87.2K followers, 65.3K engagements


"Open source Wi-Fi stack for ESP32 SoCs through reverse engineering pre-compiled binary blobs Part 1: Part 2: Repo: #esp32 #cybersecurity https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/"  
[X Link](https://x.com/0xor0ne/status/1839560629532660084)  2024-09-27T07:00Z 87.2K followers, 38.1K engagements


"Introduction to Linux kernel internals and modules development "The Linux Kernel Module Programming Guide" #Linux #infosec https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"  
[X Link](https://x.com/0xor0ne/status/1840292943808119249)  2024-09-29T07:30Z 87.2K followers, 34.9K engagements


"Intro to malware reverse engineering Part 1: Part 2: Series by @IntezerLabs #malware #cybersecurity https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"  
[X Link](https://x.com/0xor0ne/status/1842588090520453296)  2024-10-05T15:30Z 87.2K followers, 36.3K engagements


"Collection of write-ups blog posts and papers related to cybersecurity reverse engineering and exploitation #infosec #cybersecurity https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md"  
[X Link](https://x.com/0xor0ne/status/1842829665481748982)  2024-10-06T07:30Z 87.2K followers, 33.9K engagements


"Intro for beginners to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"  
[X Link](https://x.com/0xor0ne/status/1851172122711773524)  2024-10-29T08:00Z 87.3K followers, 31.7K engagements


"Windows kernel exploitation beginners introduction Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"  
[X Link](https://x.com/0xor0ne/status/1851655363474366709)  2024-10-30T16:00Z 87.2K followers, 31.9K engagements


"Introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"  
[X Link](https://x.com/0xor0ne/status/1860601769539076542)  2024-11-24T08:30Z 87.2K followers, 28.8K engagements


"Intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"  
[X Link](https://x.com/0xor0ne/status/1871949104974123486)  2024-12-25T16:00Z 87.2K followers, 34.4K engagements


"Easy introduction to cryptography concept with practical examples in Linux (openssl) Part 1: Part 2: Part 3: Part 4: Credits @sergioprado #cryptography #infosec https://sergioprado.blog/what-are-random-numbers-and-how-they-are-managed-on-linux/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/what-are-random-numbers-and-how-they-are-managed-on-linux/"  
[X Link](https://x.com/0xor0ne/status/1874002642474577998)  2024-12-31T08:00Z 87.2K followers, 43.2K engagements


"Reverse engineering and malware analysis series Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"  
[X Link](https://x.com/0xor0ne/status/1883560559091540043)  2025-01-26T17:00Z 87.2K followers, 34.3K engagements


"Iptables for local privilege escalation #Linux #infosec https://www.shielder.com/blog/2024/09/a-journey-from-sudo-iptables-to-local-privilege-escalation/ https://www.shielder.com/blog/2024/09/a-journey-from-sudo-iptables-to-local-privilege-escalation/"  
[X Link](https://x.com/0xor0ne/status/1885727331550945326)  2025-02-01T16:30Z 87.3K followers, 33.3K engagements


"Intercepting Linux system calls #cybersecurity #Linux https://blog.mggross.com/intercepting-syscalls/ https://blog.mggross.com/intercepting-syscalls/"  
[X Link](https://x.com/0xor0ne/status/1887410940724891734)  2025-02-06T08:00Z 87.2K followers, 29.5K engagements


"Nice introduction to Linux kernel rootkits #Linux #infosec https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"  
[X Link](https://x.com/0xor0ne/status/1890800751749853583)  2025-02-15T16:30Z 87.2K followers, 40.4K engagements


"Introduction to reverse engineering and malware analysis Part 1: Part 2: #malware #cybersecurity https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"  
[X Link](https://x.com/0xor0ne/status/1891042344926928992)  2025-02-16T08:30Z 87.2K followers, 36.5K engagements


"Intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"  
[X Link](https://x.com/0xor0ne/status/1891887913383670159)  2025-02-18T16:30Z 87.2K followers, 36.7K engagements


"Introduction for beginners to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #cybersecurity https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"  
[X Link](https://x.com/0xor0ne/status/1902034780964737376)  2025-03-18T16:30Z 87.2K followers, 25.7K engagements


"Beginners introduction to Linux kernel rootkits #Linux #cybersecurity https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"  
[X Link](https://x.com/0xor0ne/status/1902389716357673028)  2025-03-19T16:00Z 87.2K followers, 36.2K engagements


"Reverse engineering and malware analysis (introduction for beginners) Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"  
[X Link](https://x.com/0xor0ne/status/1903484335254098352)  2025-03-22T16:30Z 87.2K followers, 39.4K engagements


"Introdution for beginners to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"  
[X Link](https://x.com/0xor0ne/status/1903725926963368003)  2025-03-23T08:30Z 87.2K followers, 36.2K engagements


"Write-ups blog posts and papers related to cybersecurity reverse engineering and exploitation #infosec #cybersecurity https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md"  
[X Link](https://x.com/0xor0ne/status/1906247545417806163)  2025-03-30T07:30Z 87.2K followers, 32.1K engagements


"Reverse engineering and security analysis of an ESP32 based IoT device Blog post by James Warner (@jmswrnr) #esp32 #infosec https://jmswrnr.com/blog/hacking-a-smart-home-device https://jmswrnr.com/blog/hacking-a-smart-home-device"  
[X Link](https://x.com/anyuser/status/1911321038341784041)  2025-04-13T07:30Z 87.2K followers, 23.7K engagements


"Short introduction to Linux kernel rootkits #Linux #cybersecurity https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"  
[X Link](https://x.com/anyuser/status/1913616220739223907)  2025-04-19T15:30Z 87.2K followers, 28.8K engagements


"Valve Anti-Cheat (VAC) solution reverse engineering #infosec #reverseengineering https://codeneverdies.github.io/posts/gh-2/ https://codeneverdies.github.io/posts/gh-2/"  
[X Link](https://x.com/anyuser/status/1923763047077732390)  2025-05-17T15:30Z 87.2K followers, 32.7K engagements


"Linux kernel rootkits: beginners introduction #Linux #infosec https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"  
[X Link](https://x.com/anyuser/status/1924721987181551776)  2025-05-20T07:00Z 87.2K followers, 24.8K engagements


"Windows kernel exploitation for beginners Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"  
[X Link](https://x.com/anyuser/status/1936446621140545945)  2025-06-21T15:30Z 87.2K followers, 45.2K engagements


"Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras by @Watchful_IP #embedded #cybersecurity https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html"  
[X Link](https://x.com/0xor0ne/status/1969793887548961121)  2025-09-21T16:00Z 87.2K followers, 30.5K engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@0xor0ne Avatar @0xor0ne 0xor0ne

0xor0ne posts on X about credits, tplink, if you, posts the most. They currently have [------] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours.

Engagements: [------] #

Engagements Line Chart

  • [--] Week [------] +60%
  • [--] Month [-------] -25%
  • [--] Months [---------] +41%
  • [--] Year [---------] -53%

Mentions: [--] #

Mentions Line Chart

  • [--] Week [--] +76%
  • [--] Month [--] +20%
  • [--] Months [---] +55%
  • [--] Year [---] -8.50%

Followers: [------] #

Followers Line Chart

  • [--] Week [------] +0.15%
  • [--] Month [------] +1.50%
  • [--] Months [------] +8.80%
  • [--] Year [------] +21%

CreatorRank: [-------] #

CreatorRank Line Chart

Social Influence

Social category influence technology brands 10.38% stocks 1.89% gaming 1.89% countries 0.94%

Social topic influence credits 24.53%, tplink #46, if you 3.77%, posts #76, iot 2.83%, android 1.89%, firmware #27, $googl 1.89%, level 1.89%, list 1.89%

Top accounts mentioned or mentioned by @transilienceai @sergioprado @voidstarsec @intezerlabs @quarkslab @limitedresults @watchfulip @palantir555 @momo5502 @lordnoteworthy @idov31 @cybernews_alert @natashenka @sethjenkins @neodyme @hyprdude @evilsocket @landaire @qkaiser @matheusgarbelin

Top assets mentioned Alphabet Inc Class A (GOOGL)

Top Social Posts

Top posts by engagements in the last [--] hours

"Great 3-parts series on 0-click exploit chain targeting Android Pixel [--] Arbitrary code execution in mediacodec - kernel privilege escalation Part 1: Part 2: Part 3: Research by Natalie Silvanovich (@natashenka) and Seth Jenkins (@__sethJenkins) #infosec https://projectzero.google/2026/01/pixel-0-click-part-3.html https://projectzero.google/2026/01/pixel-0-click-part-2.html https://projectzero.google/2026/01/pixel-0-click-part-1.html https://projectzero.google/2026/01/pixel-0-click-part-3.html https://projectzero.google/2026/01/pixel-0-click-part-2.html"
X Link 2026-02-11T16:18Z 87.3K followers, [----] engagements

"Bruteforcing ECC and dumping firmware from a Potensic Atom [--] drone Research by @Neodyme #infosec https://neodyme.io/en/blog/drone_hacking_part_1/#intro https://neodyme.io/en/blog/drone_hacking_part_1/#intro"
X Link 2026-01-25T17:00Z 87.1K followers, 11.1K engagements

"Exploiting vulnerabilities in MediaTek MT76xx and MT7915 Wifi chipset family Credits @hyprdude #infosec https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html"
X Link 2026-01-29T08:00Z 87.2K followers, 12.8K engagements

"Reverse engineering and dumping firmware from a low-cost smartwatch by Damien Cauquil (@quarkslab) #infosec https://blog.quarkslab.com/modern-tale-blinkenlights.html https://blog.quarkslab.com/modern-tale-blinkenlights.html"
X Link 2026-01-30T08:00Z 87.1K followers, 18.5K engagements

"TP-Link Tapo C200 IP camera: security analysis and exploitation by @evilsocket #infosec #iot https://www.evilsocket.net/2025/12/18/TP-Link-Tapo-C200-Hardcoded-Keys-Buffer-Overflows-and-Privacy-in-the-Era-of-AI-Assisted-Reverse-Engineering/ https://www.evilsocket.net/2025/12/18/TP-Link-Tapo-C200-Hardcoded-Keys-Buffer-Overflows-and-Privacy-in-the-Era-of-AI-Assisted-Reverse-Engineering/"
X Link 2026-01-15T08:00Z 87.3K followers, 142.2K engagements

"Deep-dive by @landaire into reverse engineering Splinter Cell's (2002) .lin Unreal Engine [--] archive format #ReverseEngineering https://landaire.net/a-file-format-uncracked-for-20-years/ https://landaire.net/a-file-format-uncracked-for-20-years/"
X Link 2026-02-12T08:01Z 87.3K followers, [----] engagements

"Just a reminder of a few great tools for firmware unpacking repacking and analysis binwalk: EMBA: unblob: ofrak: #iot #embedded #reverseengineering #infosec https://github.com/redballoonsecurity/ofrak https://github.com/onekey-sec/unblob https://github.com/e-m-b-a/emba https://github.com/ReFirmLabs/binwalk https://github.com/redballoonsecurity/ofrak https://github.com/onekey-sec/unblob https://github.com/e-m-b-a/emba https://github.com/ReFirmLabs/binwalk"
X Link 2023-01-28T08:30Z 87.3K followers, 95K engagements

"Excellent free book for anyone interested in Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2023-06-09T16:30Z 87.3K followers, 227.8K engagements

"Great free guide for learninig Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2023-08-12T18:30Z 87.2K followers, 65.7K engagements

"Excellent research on reverse engineering and pwning a Google Home Mini smart speaker. A must read if you are interested in embedded device security and vulnerability research. #iot #embedded #infosec #cybersecurity https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html"
X Link 2023-10-24T11:15Z 87.2K followers, 54.8K engagements

"If you are a beginner and interested in malware analysis this is an excellent introduction series by @IntezerLabs Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2024-01-13T19:30Z 87.3K followers, 46K engagements

"Introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #cybersecurity https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2025-02-02T17:00Z 87.3K followers, 40.8K engagements

"TP-Link Tapo C200 reverse engineering and exploitation Credits @qkaiser #infosec #embedded https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/ https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/"
X Link 2026-01-27T16:30Z 87.2K followers, 29.9K engagements

"Very cool repo for learning how to use rust for offensive security https://github.com/trickster0/OffensiveRust https://github.com/trickster0/OffensiveRust"
X Link 2022-12-19T17:30Z 87.3K followers, 45.7K engagements

"If you're interested in bluetooth low level hacking take a look at this cool project by Matheus Eduardo Garbelini (@MatheusGarbelin) Active Bluetooth BR/EDR Sniffer/Injector: #bluetooth #esp32 #espressif #hacking #infosec https://github.com/Matheus-Garbelini/esp32_bluetooth_classic_sniffer https://github.com/Matheus-Garbelini/esp32_bluetooth_classic_sniffer"
X Link 2022-12-23T17:30Z 87.3K followers, 78.6K engagements

"Cool secure boot bypass by fault injection in ESP32 CPUs by @LimitedResults #embedded #iot #hardware #faultinjection #infosec https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/ https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/"
X Link 2023-01-03T17:30Z 87.3K followers, 69.3K engagements

"Secure boot bypass by fault injection in (Espressif) ESP32 CPUs Credits @LimitedResults #embedded #iot #hardware #faultinjection #infosec https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/ https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/"
X Link 2023-05-28T07:30Z 87.3K followers, 65K engagements

"Cybersecurity related awesome list: blog posts write-ups papers and tools related to cybersecurity reverse engineering and exploitation #cybersecurity #infosec https://github.com/0xor0ne/awesome-list https://github.com/0xor0ne/awesome-list"
X Link 2025-05-29T12:03Z 87.3K followers, 52.4K engagements

"Valve Anti-Cheat (VAC) reverse engineering #infosec https://codeneverdies.github.io/posts/gh-2/ https://codeneverdies.github.io/posts/gh-2/"
X Link 2025-09-27T15:30Z 87.3K followers, 48.8K engagements

"Heap overflow in MediaTek's DA2 USB file download handler that gives code execution on (Carbonara) patched V6 devices Research by @r0rt1z2 and shomy #infosec https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/ https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/"
X Link 2026-01-31T16:30Z 87.3K followers, [----] engagements

"Clang Hardening Cheat Sheet (2026) Credits @0xTRIKKSS and @bcreusillet (@quarkslab) #infosec https://blog.quarkslab.com/clang-hardening-cheat-sheet-ten-years-later.html https://blog.quarkslab.com/clang-hardening-cheat-sheet-ten-years-later.html"
X Link 2026-02-01T17:01Z 87.3K followers, [----] engagements

"TP-Link (Tapo) C210 cloud camera: bootloader vulnerability and firmware decryption by @Watchful_IP #infosec https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html"
X Link 2026-02-02T16:03Z 87.3K followers, 15.1K engagements

""From Zero to QEMU: A journey into system emulation" (slide deck by Antonio Nappa) #infosec #qemu https://docs.google.com/presentation/d/1g0hTGKXWf6EvyUIjw4qomJ5CGrV245nbGn5p-yNu1Sc/editslide=id.g357295fe39c_0_3#slide=id.g357295fe39c_0_3 https://docs.google.com/presentation/d/1g0hTGKXWf6EvyUIjw4qomJ5CGrV245nbGn5p-yNu1Sc/editslide=id.g357295fe39c_0_3#slide=id.g357295fe39c_0_3"
X Link 2026-02-03T08:01Z 87.3K followers, 28.7K engagements

""DIRTYFREE: Simplified Data-Oriented Programming in the Linux Kernel" (paper) Authors: Yoochan Lee Hyuk Kwon and Thorsten Holz #infosec #Linux https://leeyoochan.github.io/assets/pdf/DirtyFree_NDSS_2026.pdf https://leeyoochan.github.io/assets/pdf/DirtyFree_NDSS_2026.pdf"
X Link 2026-02-03T16:30Z 87.3K followers, [----] engagements

"Airoha Bluetooth RACE vulnerabilities (CVE-2025-20700/20701/20702) Blog post: White paper: Credits Dennis Heinze Frieder Steinmetz (@ERNW_ITSec) #infosec #bluetooth https://static.ernw.de/whitepaper/ERNW_White_Paper_74_1.0.pdf https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/ https://static.ernw.de/whitepaper/ERNW_White_Paper_74_1.0.pdf https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/"
X Link 2026-02-04T16:02Z 87.3K followers, [----] engagements

"Reverse engineering Realtek RTL8761B* Bluetooth chips to make better Bluetooth security tools & classes (slide deck by @XenoKovah) #infosec https://darkmentor.com/publication/2025-11-hardweario/ https://darkmentor.com/publication/2025-11-hardweario/"
X Link 2026-02-05T08:00Z 87.3K followers, 14.3K engagements

"Beginners intro to Linux kernel fuzzing and vulnerability research (2024 blog post series by @slava_moskvin_) Part 1: Part 2: Part 3: #Linux #cybersecurity https://slavamoskvin.com/finding-bugs-in-kernel.-part-2-fuzzing-the-actual-kernel/ https://slavamoskvin.com/finding-bugs-in-kernel.-part-1-crashing-a-vulnerable-driver-with-syzkaller/ https://slavamoskvin.com/hunting-bugs-in-linux-kernel-with-kasan-how-to-use-it-whats-the-benefit/ https://slavamoskvin.com/finding-bugs-in-kernel.-part-2-fuzzing-the-actual-kernel/"
X Link 2026-02-05T16:01Z 87.3K followers, [----] engagements

"Deep dive into how Windows on ARM handles interrupts by Connor McGarr (@33y0re) #Windows #infosec https://connormcgarr.github.io/windows-arm64-interrupts/ https://connormcgarr.github.io/windows-arm64-interrupts/"
X Link 2026-02-06T08:00Z 87.3K followers, [----] engagements

"CVE-2025-3052 explained: running unsigned code during the UEFI boot process Credits @binarly_io #infosec https://www.binarly.io/blog/another-crack-in-the-chain-of-trust https://www.binarly.io/blog/another-crack-in-the-chain-of-trust"
X Link 2026-02-06T16:01Z 87.3K followers, [----] engagements

"Command & Conquer: network architecture exposed attack surface discovered vulnerabilities and exploitation Research by Bryan Alexander and Jordan Whitehead #infosec https://www.atredis.com/blog/2026/1/26/generals https://www.atredis.com/blog/2026/1/26/generals"
X Link 2026-02-07T16:30Z 87.3K followers, [----] engagements

"Unauthenticated RCE in NetSupport Manager by chaining CVE-2025-34164 (heap OOB write) and CVE-2025-34165 (stack OOB read) Credits Fabian Weber (@codewhitesec) #infosec https://code-white.com/blog/2026-01-nsm-rce/ https://code-white.com/blog/2026-01-nsm-rce/"
X Link 2026-02-08T17:00Z 87.3K followers, [----] engagements

"Short beginners introduction to virtual memory #cybersecurity https://nghiant3223.github.io/2025/05/29/fundamental_of_virtual_memory.html https://nghiant3223.github.io/2025/05/29/fundamental_of_virtual_memory.html"
X Link 2026-02-09T16:01Z 87.3K followers, [----] engagements

"Exploiting Linux by abusing page table entries #Linux #infosec https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326 https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326"
X Link 2026-02-10T08:00Z 87.3K followers, 10.9K engagements

"Escalate privileges from a rooted user space (N-EL0) to the highest privilege level in the Secure World (S-EL3) (Android Xiaomi Redmi 11s) (CCC 2025) #infosec https://media.ccc.de/v/39c3-not-to-be-trusted-a-fiasco-in-android-tees https://media.ccc.de/v/39c3-not-to-be-trusted-a-fiasco-in-android-tees"
X Link 2026-02-10T16:30Z 87.3K followers, [----] engagements

"Dirty Pageflags: abusing page table entries for exploiting Linux #Linux #infosec https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326 https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326"
X Link 2026-02-12T16:02Z 87.3K followers, [----] engagements

"MediaTek exploit that lets you write to arbitrary memory via the Download Agent bypassing DA2 signature verification Blog post by @shomykohai #infosec https://shomy.is-a.dev/blog/article/serving-carbonara https://shomy.is-a.dev/blog/article/serving-carbonara"
X Link 2026-02-13T08:00Z 87.3K followers, [----] engagements

"Cybersecurity blog posts writeups papers and tools #infosec https://github.com/0xor0ne/awesome-list https://github.com/0xor0ne/awesome-list"
X Link 2026-02-13T16:02Z 87.3K followers, 19K engagements

"(1/4) Great series on Linux rootkits by @TheXcellerator Part 1: Introduction and Workflow: Part 2: Ftrace and Function Hooking: Part 3: A Backdoor to Root: #Linux #kernel #malware #infosec #cybersecurity https://xcellerator.github.io/posts/linux_rootkits_03/ https://xcellerator.github.io/posts/linux_rootkits_02/ https://xcellerator.github.io/posts/linux_rootkits_01/ https://xcellerator.github.io/posts/linux_rootkits_03/ https://xcellerator.github.io/posts/linux_rootkits_02/ https://xcellerator.github.io/posts/linux_rootkits_01/"
X Link 2023-02-25T19:30Z 87.3K followers, 58.3K engagements

"Great website if you need a quick reference to Linux kernel syscalls (numbers) #Linux https://syscalls.mebeim.net/ https://syscalls.mebeim.net/"
X Link 2023-04-21T16:30Z 87.2K followers, 78K engagements

"Nice series introducing cryptography concepts for beginners (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"
X Link 2023-04-22T18:30Z 87.3K followers, 73.6K engagements

"Nice reading for anyone interested in Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2023-04-23T07:30Z 87.2K followers, 117.5K engagements

"Nice intro for beginners to bluetooth communications reverse engineering (Domyos EL500) Credits @Palantir555 #bluetooth https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/ https://jcjc-dev.com/2023/03/19/reversing-domyos-el500-elliptical/"
X Link 2023-05-13T18:30Z 87.3K followers, 58.5K engagements

"Reverse engineering the runtime code integrity protection of Call of Duty: Black Ops [--] Blog post by @momo5502 #reverseengineering https://buff.ly/3Xwv5N https://buff.ly/3Xwv5N"
X Link 2023-05-16T11:15Z 87.3K followers, 66.7K engagements

"(1/2) Excellent series by @LordNoteworthy explaining how virtualization on x86 works Intro to Virtualization: VMWare and Full Virtualization using Binary Translation: #virtualization #hacking #infotech #infosec #learning https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/ https://docs.saferwall.com/blog/virtualization-internals-part-1-intro-to-virtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/"
X Link 2023-05-21T07:30Z 87.2K followers, 68.3K engagements

"Nice beginners series by @IntezerLabs on malware reverse engineering Part 1: Part 2: #malware https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2023-05-26T16:30Z 87.3K followers, 61.6K engagements

"Excellent research work for anyone interested in Wi-Fi security MiTM by exploiting cross-layer interactions between WPAs and ICMP #wifi #infosec #cybersecurity #wireless https://csis.gmu.edu/ksun/publications/WiFi_Interception_SP23.pdf https://csis.gmu.edu/ksun/publications/WiFi_Interception_SP23.pdf"
X Link 2023-05-29T08:00Z 87.3K followers, 87.3K engagements

"Excellent series on Windows rootkit development for red teaming Credits @Idov31 Part 1: Part 2: Part 3: Part 4: #windows #driver #kernel #rootkit #redteam https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html"
X Link 2023-06-02T16:30Z 87.3K followers, 86.6K engagements

"Great website if you need a quick reference to Linux kernel syscalls (numbers) #Linux #syscall #kernel https://syscalls.mebeim.net https://syscalls.mebeim.net"
X Link 2023-06-10T18:30Z 87.3K followers, 121.5K engagements

"Excellent introduction to cryptography concepts for beginners (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"
X Link 2023-06-12T08:00Z 87.2K followers, 179.3K engagements

"In case you missed this is a great series by greenluigi1 on car Infotainment system hacking Part 1: Part 2: Part 3: #hacking #automotive #carhacking #infosec #cybersecurity https://programmingwithstyle.com/posts/howihackedmycarpart3/ https://programmingwithstyle.com/posts/howihackedmycarpart2/ https://programmingwithstyle.com/posts/howihackedmycar/ https://programmingwithstyle.com/posts/howihackedmycarpart3/ https://programmingwithstyle.com/posts/howihackedmycarpart2/ https://programmingwithstyle.com/posts/howihackedmycar/"
X Link 2023-06-13T07:00Z 87.3K followers, 86.2K engagements

"Home router hacking presentation at HITB2023 (@NCCGroupInfosec) "Your not so Home Office - SOHO Hacking at Pwn2Own" #soho #router #exploit #embedded #iot #infosec #cybersecurity http://conference.hitb.org/files/hitbsecconf2023ams/materials/D1T1%20-%20Your%20Not%20So%20Home%20Office%20-%20Soho%20Hacking%20at%20Pwn2Own%20-%20McCaulay%20Hudson%20&%20Alex%20Plaskett.pdf http://conference.hitb.org/files/hitbsecconf2023ams/materials/D1T1%20-%20Your%20Not%20So%20Home%20Office%20-%20Soho%20Hacking%20at%20Pwn2Own%20-%20McCaulay%20Hudson%20&%20Alex%20Plaskett.pdf"
X Link 2023-06-16T07:00Z 87.2K followers, 115.8K engagements

"Very useful guide for learning Make (and Makefiles) #make #makefile #infosec #cybersecurity https://makefiletutorial.com https://makefiletutorial.com"
X Link 2023-06-18T18:30Z 87.3K followers, 111.6K engagements

"Excellent blog post on reverse engineering and pwning a Google Home Mini smart speaker. A must read for anyone interested in embedded device security and vulnerability research. #iot #embedded #infosec #cybersecurity https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html"
X Link 2023-06-19T16:30Z 87.3K followers, 101.6K engagements

"Excellent series for learning a bit more about Linux kernel internals and exploitation techniques Credits @_lkmidas Part 1: Part 2: Part 3: #Linux https://lkmidas.github.io/posts/20210205-linux-kernel-pwn-part-3/ https://lkmidas.github.io/posts/20210128-linux-kernel-pwn-part-2/ https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/ https://lkmidas.github.io/posts/20210205-linux-kernel-pwn-part-3/ https://lkmidas.github.io/posts/20210128-linux-kernel-pwn-part-2/ https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/"
X Link 2023-06-25T07:30Z 87.3K followers, 70.1K engagements

"Cool series to learn IoT/embedded devices reverse engineering (credits @Palantir555) Debug Ports: Firmware: Data: Flash: Digging the Firmware: #iot https://buff.ly/3WUY50u https://buff.ly/3WKnhay https://buff.ly/3WRz5r4 https://buff.ly/3WHNOFo https://buff.ly/3WGw513 https://buff.ly/3WUY50u https://buff.ly/3WKnhay https://buff.ly/3WRz5r4 https://buff.ly/3WHNOFo https://buff.ly/3WGw513"
X Link 2023-06-27T11:15Z 87.3K followers, 63.4K engagements

"Here are a few resources for getting started with Satellite hacking and CTFs Satellite Hacking Demystified: Hack-a-sat writeups: Hack-a-sat players corner: #satellite #infosec https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/Satellite-Hacking-Demystified/ https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/Satellite-Hacking-Demystified/"
X Link 2023-08-09T07:00Z 87.2K followers, 60.7K engagements

"Excellent introduction to cryptography concepts for beginners with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"
X Link 2023-08-14T08:01Z 87.2K followers, 84.8K engagements

"Interesting series on how virtualization works (VMware XEN QEMU) Credits @LordNoteworthy Part 1: Part 2: Part 3: Part 4: #virtualization #infotech https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu https://docs.saferwall.com/blog/virtualization-internals-part-3-xen-and-paravirtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/ https://docs.saferwall.com/blog/virtualization-internals-part-1-intro-to-virtualization/ https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu"
X Link 2023-09-06T18:00Z 87.2K followers, 63.6K engagements

"Beginner introduction to cryptography concepts with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec #cybersecurity https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"
X Link 2023-10-10T07:00Z 87.2K followers, 87.2K engagements

"Introduction guide to Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel #programming #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2023-10-12T19:30Z 87.2K followers, 88K engagements

"Windows rootkit development for red teaming Excellent series by @Idov31 Part 1: Part 2: Part 3: Part 4: PArt 5: #windows #driver #kernel #rootkit #redteam https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html"
X Link 2023-10-19T19:30Z 87.3K followers, 61.4K engagements

"Reverse engineering the Brightway (Xiaomi) scooters Interesting blog post for anyone interested in embedded devices reverse engineering #reverseengineering #cybersecurity #infotech https://robocoffee.de/p=436 https://robocoffee.de/p=436"
X Link 2023-10-29T08:30Z 87.2K followers, 70.8K engagements

"List of links to blog posts write-ups and papers related to cybersecurity reverse engineering and exploitation (constantly updated) #cybersecurity #infosec https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.mdref=0xor0ne.xyz https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.mdref=0xor0ne.xyz"
X Link 2023-11-27T16:00Z 87.2K followers, 103.9K engagements

"MikroTik routers reverse engineering and exploitation Excellent work by @hgarrereyn and @__comedian Blog post: Slides (RECon): #iot #mikrotik #cybsersecurity https://github.com/MarginResearch/resources/blob/83e402a86370f7c3acf8bb3ad982c1fee89c9b53/documents/Pulling_MikroTik_into_the_Limelight.pdf https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/ https://github.com/MarginResearch/resources/blob/83e402a86370f7c3acf8bb3ad982c1fee89c9b53/documents/Pulling_MikroTik_into_the_Limelight.pdf https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/"
X Link 2023-12-03T08:30Z 87.3K followers, 56.7K engagements

"Introduction to cryptography concepts for beginners with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ref=0xor0ne.xyz https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ref=0xor0ne.xyz https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ref=0xor0ne.xyz https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ref=0xor0ne.xyz"
X Link 2023-12-05T17:30Z 87.2K followers, 56.3K engagements

""The Linux Kernel Module Programming Guide" Introduction guide to Linux kernel internals and modules development (updated to 5.x kernels) #Linux #kernel #lkm https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2023-12-07T08:01Z 87.3K followers, 52.2K engagements

"Call of Duty: Black Ops [--] - Reverse engineering of runtime code integrity protection Writeup by @momo5502 #reverseengineering #infosec https://web.archive.org/web/20230522230748/https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/ https://web.archive.org/web/20230522230748/https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/"
X Link 2023-12-09T08:30Z 87.2K followers, 47.6K engagements

"Beginner intro to cryptography concepts with practical examples in Linux (openssl) (credits @sergioprado) Part 1: Part 2: Part 3: #cryptography #infosec https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/"
X Link 2024-02-08T17:30Z 87.2K followers, 32.1K engagements

"Interesting project attempting to reverse engineering the precompiled Wi-Fi stack of ESP32 SoC to recreate an open source version Part 1: Part 2: Repo: #esp32 #infosec https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/"
X Link 2024-03-03T08:30Z 87.3K followers, 33.6K engagements

"Excellent beginners introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-03-21T17:30Z 87.3K followers, 32.6K engagements

"Beginners series for starting with embedded devices reverse engineering Credits @voidstarsec Ghidra setup: Tools: Firmware extraction: #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-03-23T16:30Z 87.2K followers, 33.5K engagements

"Reverse engineering and vulnerability analysis of DJI drones' firmware. A two-parts blog series by @nozominetworks Firmware Analysis: Vulnerability Analysis: Particularly interesting is the chain of weak Wi-Fi password cracking (CVE-2023-6951) followed by the unauthenticated video exfiltration (CVE-2023-6949) #dji #drone https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-1-firmware-analysis https://www.nozominetworks.com/blog/dji-mavic-3-drone-research-part-2-vulnerability-analysis"
X Link 2024-04-02T15:09Z 87.2K followers, 43.4K engagements

"Must read guide for anyone starting with Linux kernel internals and modules development (updated to 5.x kernels) "The Linux Kernel Module Programming Guide" #Linux #kernel https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2024-04-14T18:30Z 87.2K followers, 43.5K engagements

"Nice introduction to Windows kernel exploitation for beginners Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-05-01T12:00Z 87.2K followers, 32.4K engagements

"Getting started with embedded devices reverse engineering (Beginners series) Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-07-24T07:00Z 87.2K followers, 23.3K engagements

"Get started with Satellite hacking and CTFs Satellite Hacking Demystified: Hack-a-sat writeups: Hack-a-sat players corner: #satellite #cybersecurity https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/satellite-hacking-demystified https://hackasat.com/players-corner/ https://github.com/solar-wine/writeups https://redteamrecipe.com/satellite-hacking-demystified"
X Link 2024-07-27T07:30Z 87.2K followers, 36.7K engagements

"Reverse engineering of ESP32's precompiled Wi-Fi stack Part 1: Part 2: Repo: #esp32 #cybersecurity https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/"
X Link 2024-08-10T07:30Z 87.3K followers, 39.9K engagements

"Beginners intro to Linux kernel exploitation (env setup and ret2usr) Part 1: Part 2: #Linux #cybersecurity http://scoding.de/linux-kernel-exploitation-buffer_overflow http://scoding.de/linux-kernel-exploitation-environment http://scoding.de/linux-kernel-exploitation-buffer_overflow http://scoding.de/linux-kernel-exploitation-environment"
X Link 2024-09-10T07:00Z 87.2K followers, 41.5K engagements

"Intro to windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-09-15T16:00Z 87.2K followers, 51.2K engagements

"Beginners intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-09-21T15:30Z 87.2K followers, 65.3K engagements

"Open source Wi-Fi stack for ESP32 SoCs through reverse engineering pre-compiled binary blobs Part 1: Part 2: Repo: #esp32 #cybersecurity https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/ https://github.com/esp32-open-mac/esp32-open-mac https://zeus.ugent.be/blog/23-24/esp32-reverse-engineering-continued/ https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/"
X Link 2024-09-27T07:00Z 87.2K followers, 38.1K engagements

"Introduction to Linux kernel internals and modules development "The Linux Kernel Module Programming Guide" #Linux #infosec https://sysprog21.github.io/lkmpg/ https://sysprog21.github.io/lkmpg/"
X Link 2024-09-29T07:30Z 87.2K followers, 34.9K engagements

"Intro to malware reverse engineering Part 1: Part 2: Series by @IntezerLabs #malware #cybersecurity https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2024-10-05T15:30Z 87.2K followers, 36.3K engagements

"Collection of write-ups blog posts and papers related to cybersecurity reverse engineering and exploitation #infosec #cybersecurity https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md"
X Link 2024-10-06T07:30Z 87.2K followers, 33.9K engagements

"Intro for beginners to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #infosec https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-10-29T08:00Z 87.3K followers, 31.7K engagements

"Windows kernel exploitation beginners introduction Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-10-30T16:00Z 87.2K followers, 31.9K engagements

"Introduction to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #infosec #windows https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2024-11-24T08:30Z 87.2K followers, 28.8K engagements

"Intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2024-12-25T16:00Z 87.2K followers, 34.4K engagements

"Easy introduction to cryptography concept with practical examples in Linux (openssl) Part 1: Part 2: Part 3: Part 4: Credits @sergioprado #cryptography #infosec https://sergioprado.blog/what-are-random-numbers-and-how-they-are-managed-on-linux/ https://sergioprado.blog/asymmetric-key-encryption-and-digital-signatures-in-practice/ https://sergioprado.blog/a-hands-on-approach-to-symmetric-key-encryption/ https://sergioprado.blog/introduction-to-encryption-for-embedded-linux-developers/ https://sergioprado.blog/what-are-random-numbers-and-how-they-are-managed-on-linux/"
X Link 2024-12-31T08:00Z 87.2K followers, 43.2K engagements

"Reverse engineering and malware analysis series Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2025-01-26T17:00Z 87.2K followers, 34.3K engagements

"Iptables for local privilege escalation #Linux #infosec https://www.shielder.com/blog/2024/09/a-journey-from-sudo-iptables-to-local-privilege-escalation/ https://www.shielder.com/blog/2024/09/a-journey-from-sudo-iptables-to-local-privilege-escalation/"
X Link 2025-02-01T16:30Z 87.3K followers, 33.3K engagements

"Intercepting Linux system calls #cybersecurity #Linux https://blog.mggross.com/intercepting-syscalls/ https://blog.mggross.com/intercepting-syscalls/"
X Link 2025-02-06T08:00Z 87.2K followers, 29.5K engagements

"Nice introduction to Linux kernel rootkits #Linux #infosec https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"
X Link 2025-02-15T16:30Z 87.2K followers, 40.4K engagements

"Introduction to reverse engineering and malware analysis Part 1: Part 2: #malware #cybersecurity https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2025-02-16T08:30Z 87.2K followers, 36.5K engagements

"Intro to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #reverseengineering #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2025-02-18T16:30Z 87.2K followers, 36.7K engagements

"Introduction for beginners to Windows kernel exploitation Part 1: Part 2: Part 3: Part 4: Part 5: #windows #cybersecurity https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2025-03-18T16:30Z 87.2K followers, 25.7K engagements

"Beginners introduction to Linux kernel rootkits #Linux #cybersecurity https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"
X Link 2025-03-19T16:00Z 87.2K followers, 36.2K engagements

"Reverse engineering and malware analysis (introduction for beginners) Part 1: Part 2: #malware #infosec https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/ https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/"
X Link 2025-03-22T16:30Z 87.2K followers, 39.4K engagements

"Introdution for beginners to embedded devices reverse engineering Ghidra setup: Tools: Firmware extraction: Credits @voidstarsec #cybersecurity https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment https://voidstarsec.com/blog/uart-uboot-and-usb https://voidstarsec.com/blog/intro-to-embedded-part-1 https://voidstarsec.com/blog/ghidra-dev-environment"
X Link 2025-03-23T08:30Z 87.2K followers, 36.2K engagements

"Write-ups blog posts and papers related to cybersecurity reverse engineering and exploitation #infosec #cybersecurity https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md"
X Link 2025-03-30T07:30Z 87.2K followers, 32.1K engagements

"Reverse engineering and security analysis of an ESP32 based IoT device Blog post by James Warner (@jmswrnr) #esp32 #infosec https://jmswrnr.com/blog/hacking-a-smart-home-device https://jmswrnr.com/blog/hacking-a-smart-home-device"
X Link 2025-04-13T07:30Z 87.2K followers, 23.7K engagements

"Short introduction to Linux kernel rootkits #Linux #cybersecurity https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"
X Link 2025-04-19T15:30Z 87.2K followers, 28.8K engagements

"Valve Anti-Cheat (VAC) solution reverse engineering #infosec #reverseengineering https://codeneverdies.github.io/posts/gh-2/ https://codeneverdies.github.io/posts/gh-2/"
X Link 2025-05-17T15:30Z 87.2K followers, 32.7K engagements

"Linux kernel rootkits: beginners introduction #Linux #infosec https://inferi.club/post/the-art-of-linux-kernel-rootkits https://inferi.club/post/the-art-of-linux-kernel-rootkits"
X Link 2025-05-20T07:00Z 87.2K followers, 24.8K engagements

"Windows kernel exploitation for beginners Part 1: Part 2: Part 3: Part 4: Part 5: #windows #infosec https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/ https://mdanilor.github.io/posts/hevd-4/ https://mdanilor.github.io/posts/hevd-3/ https://mdanilor.github.io/posts/hevd-2/ https://mdanilor.github.io/posts/hevd-1/ https://mdanilor.github.io/posts/hevd-0/"
X Link 2025-06-21T15:30Z 87.2K followers, 45.2K engagements

"Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras by @Watchful_IP #embedded #cybersecurity https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html https://watchfulip.github.io/28-12-24/tp-link_c210_v2.html"
X Link 2025-09-21T16:00Z 87.2K followers, 30.5K engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

creator/x::0xor0ne
/creator/x::0xor0ne