Exploiting Reversing (ER) series: article 05 | Hyper-V (part 01)

The fifth article (57 pages) of the Exploiting Reversing Series (ERS), a step-by-step research series on Windows, macOS, hypervisors and browsers, is available for reading on: (PDF): https://exploitreversing.com/wp-content/uploads/2025/03/exploit_reversing_05.pdf I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays SA (@HexRaysSA on X) for their constant and uninterrupted support, which have helped me writeโ€ฆ

Exploiting Reversing (ER) series: article 04 | macOS/iOS (part 01)

The fourth article (126 pages) of the Exploiting Reversing Series (ERS), a step-by-step research series on Windows, macOS, hypervisors and browsers, is available for reading on: (PDF): https://exploitreversing.com/wp-content/uploads/2025/02/exploit_reversing_04.pdf I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays SA (@HexRaysSA on X) for their constant and uninterrupted support, which have helped me writeโ€ฆ

Exploiting Reversing (ER) series: article 03 | Chrome (part 01)

The third article (62 pages) of the Exploiting Reversing Series (ERS), a step-by-step research series on Windows, macOS, hypervisors and browsers, is available for reading on: (PDF): https://exploitreversing.com/wp-content/uploads/2025/01/exploit_reversing_03.pdf I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays SA (@HexRaysSA on X) for their constant and uninterrupted support, which have helped me writeโ€ฆ

Malware Analysis Series (MAS): article 10 | Linux

The tenth article (35 pages) of the Malware Analysis Series (MAS), a step-by-step malware analysis and reverse engineering series, is available for reading on: (PDF): https://exploitreversing.com/wp-content/uploads/2025/01/mas_10.pdf I hope this last article of MAS helps professionals from cybersecurity communities around the world. The series is now complete. Have an excellent and keep reversing! Alexandre Borges (JANUARY/15/2025)

Malware Analysis Series (MAS): article 09 | Shellcode

The nineth article (38 pages) of the Malware Analysis Series (MAS), a step-by-step malware analysis and reverse engineering series, is available for reading on: (PDF): https://exploitreversing.com/wp-content/uploads/2025/01/mas_09-1.pdf I hope this article helps professionals from cybersecurity communities around the world. Have an excellent and keep reversing! Alexandre Borges (JANUARY/08/2025) PS: there is a typo on page 07โ€ฆ

Malware Analysis Series (MAS): article 08 | MacOS/iOS

The eighth article (62 pages) in theย Malware Analysis Series (MAS),ย a step-by-step malware analysis and reverse engineering series, is available for reading on: (PDF):ย https://exploitreversing.com/wp-content/uploads/2024/08/mas_08-1.pdf I hope this article helps professionals from cybersecurity community around the world. Have an excellent and keep reversing! Alexandre Borges (AUGUST/07/2024)

Exploiting Reversing (ER) series: article 02 | Windows kernel drivers โ€“ part 02

The second article (85 pages) in the Exploiting Reversing (ER) series, a step-by-step vulnerability research series on Windows, macOS, hypervisors and browsers, is available for reading on: (PDF): https://exploitreversing.com/wp-content/uploads/2024/05/exploit_reversing_02-2.pdf Happy New Year with happiness, harmony, peace and health to experience all the good times close to your families and friends. The best thing about thisโ€ฆ

Something went wrong. Please refresh the page and/or try again.


Follow My Blog

Get new content delivered directly to your inbox.

Mastodon