memN0ps
  • Menu ▾
    • About
    • Home
    • Showcase
  • About
  • Home
  • Showcase

Hypervisors for Memory Introspection and Reverse Engineering

2025-06-02
#hypervisors  #memory-introspection  #reverse-engineering  #windows  #uefi  #kernel  #blue-pill  #bootkit  #rootkit  #intel  #vt-x  #rust  #virtualization 
Rusty Hypervisors - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion) and Windows Kernel Blue Pill Type-2 Hypervisor in Rust (Codename: Matrix)
[Read more]

Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)

2023-07-02
#windows  #uefi  #bootkit  #rust 
[Read more]

Hypervisor Development in Rust Part 1

2023-02-18
[Read more]

Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle)

2022-08-03
#windows  #kernel  #rootkit  #rust 
[Read more]

Process Hollowing

2022-02-23
[Read more]

Parallel Syscalls

2022-02-12
[Read more]

Linux User Mode Exploit Development: Sigreturn-Oriented Programming (SROP) Part 2

2021-12-22
[Read more]

Linux User Mode Exploit Development: Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) Part 1

2021-12-17
[Read more]

Windows User Mode Exploit Development: Data Execution Prevention (DEP) Part 4

2020-10-12
[Read more]

Windows User Mode Exploit Development: Egghunter Part 3

2020-04-01
[Read more]

Windows User Mode Exploit Development: Structured Exception Handler (SEH) Part 2

2020-01-27
[Read more]

Windows User Mode Exploit Development: Part 1

2020-01-25
[Read more]

HTTP Request Smuggling (CL.TE)

2019-09-13
[Read more]

Kernel Mode Rootkits

2019-05-10
[Read more]
© 2025 Powered by Hugo :: Theme made by panr