+NCR/CRC! [ReVeRsEr]

2.3K posts

+NCR/CRC! [ReVeRsEr] banner
+NCR/CRC! [ReVeRsEr]

+NCR/CRC! [ReVeRsEr]

@crackinglandia

Crazy and disheveled guy!. From Gral. Pico, the World's Capital City of Asado. Big beer drinker. Gently reminder specialist.

RCE world Katılım Temmuz 2009
446 Takip Edilen1.2K Takipçiler
+NCR/CRC! [ReVeRsEr] retweetledi
Ryan M
Ryan M@Grimdoomer·
New blog post on reverse engineering and modifying HDD firmware. In this part I cover obtaining, analyzing, and modifying firmware, using backdoor commands to hot patch code in RAM, and using JTAG to debug a live HDD icode4.coffee/?p=1465
English
8
66
438
15.5K
Lean
Lean@leanmrz·
@AirFranela se comieron tanto el cuento de "los hombres solo se fijan en el fisico" que piensan que teniendo una carita linda y buen culo ya es suficiente para tener una relacion prospera. las relaciones terminan por A o por B, hasta por ser demasiado "perfecto" te pueden dejar kjj
Español
1
0
3
3.2K
+NCR/CRC! [ReVeRsEr] retweetledi
Alex Matrosov
Alex Matrosov@matrosov·
Lately I've been thinking about how AI is changing vulnerability research and reverse engineering. VR and RE are some of the hardest workflows to parallelize. Even with great knowledge transfer and team practices, you usually default to one person per vuln or RE task. The work is just too context-heavy to split. AI breaks that ceiling. It's no longer "one researcher, one task", it's you working one angle while Claude annotates disassembly code, explores another path, or helps you piece together what the last result means. Watching this land in domains we assumed were fundamentally serial is wild.
Alex Matrosov tweet media
English
12
46
254
23.4K
+NCR/CRC! [ReVeRsEr] retweetledi
impulsive
impulsive@weezerOSINT·
I just reverse engineered the YellowKey BitLocker bypass Microsoft shipped code that checks for a flag called "FailRelock" in every Windows 11 recovery image. When it's set to 1, after recovery unlocks your BitLocker drive, it never relocks it. All you need is a USB stick. This code only exists in the recovery environment. Not in normal Windows. They left an entire debug testing framework in production.
impulsive tweet media
impulsive@weezerOSINT

The userland demon is about to drop again.

English
34
425
2.6K
259.5K
+NCR/CRC! [ReVeRsEr] retweetledi
Mas0n
Mas0n@Mas0nShi·
IDA tricks: If you hit this error when launching IDA in batch mode inside Docker (idat, idalib): `License not yet accepted, cannot run in batch mode` You can pre-accept the EULA with:
English
1
1
29
4.2K
+NCR/CRC! [ReVeRsEr] retweetledi
Nasreddine Bencherchali
A couple years ago I wrote a blog on Dllhost and what it is actually running. I decided to revisit it this time around from a RE perspective and answer that conclusively. From CLI to the registry value. Read the research - research.nasbench.dev/research/windo… TL;DR - Dllhost is just a wrapper around CoRegisterSurrogateEx. It register but does not execute. Thats a job for combase.dll. Hence why it cannot be used as a LOLBIN directly. There are also additional fun facts in there. Enjoy!
Nasreddine Bencherchali tweet media
English
1
26
99
5.6K
+NCR/CRC! [ReVeRsEr] retweetledi
eversinc33 🤍🔪⋆。˚ ⋆
When practicing on a VM crackme recently, I created a devirtualizer which lifts the virtual machine to LLVM to defeat the protection. LLVM-based devirtualisation is a lot of fun and I wrote down my experience and lessons learned on my blog: eversinc33.com/2026/05/07/llv…
English
19
101
502
33.8K
+NCR/CRC! [ReVeRsEr] retweetledi
V4bel
V4bel@v4bel·
💥 Introducing "Dirty Frag" A universal Linux LPE chaining two vulns in xfrm-ESP and RxRPC. A successor class to Dirty Pipe & Copy Fail. No race, no panic on failure, fully deterministic. ~9 years latent. Ubuntu / RHEL / Fedora / openSUSE / CentOS / AlmaLinux, and more. Even if you've applied the "Copy Fail" mitigation, your Linux is still vulnerable to "Dirty Frag". Apply the Dirty Frag mitigation. Details: dirtyfrag.io
GIF
English
41
703
2.1K
516.4K
Alejandro
Alejandro@diegoalejocm·
El hantavirus será pandemia en un mes y todo el mundo entrará en cuarentena justo antes de que comience el mundial de fútbol.
Alejandro tweet media
Español
470
1.4K
22.5K
969.9K
+NCR/CRC! [ReVeRsEr] retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 Microsoft calls this "intended behaviour," so here we go. How to dump the credentials of every user stored in Microsoft Edge: 1. Open Edge. Don't browse anywhere, just open it. 2. Flip to Task Manager, find Edge, expand the task. 3. Highlight the "browser" sub-task, right-click, and choose "Create Memory Dump." 4. Open the dump file and look for credentials. The logged-in Windows user can dump every stored Edge credential with no additional rights. Which means any malware that user executes has those credentials for the asking. Thanks to Rob VandenBrink at SANS: isc.sans.edu/diary/32954
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
292
2.4K
13.5K
1.1M
+NCR/CRC! [ReVeRsEr] retweetledi
MatheuZ
MatheuZ@MatheuzSecurity·
Brazil is a Linux kernel rootkit factory. Diamorphine, Brokepkg, KoviD, Reptile and now Singularity. Some of the most well-known Linux kernel rootkits came from Brazilian researchers. Brazil has a crazy strong scene in linux rootkit development
English
22
114
1.4K
43.2K
+NCR/CRC! [ReVeRsEr] retweetledi
eleven red pandas
eleven red pandas@bytecodevm·
Reversing a legitimately Gigabyte signed Windows kernel driver to map 13 IOCTLs exposing physical memory access, MSR read/write, kernel memcpy, and more, and why this is the foundation of every BYOVD attack. #gdrv3 #driver #BYOVD core-jmp.org/2026/05/gdrv3-…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
13
37
1K
+NCR/CRC! [ReVeRsEr] retweetledi
Tim Blazytko
Tim Blazytko@mr_phrazer·
The recording of my second Binary Cartography webinar is public: Agentic Malware Analysis: From Task Automation to Deep Analysis Topics: string decryption, API hashing, unpacking & pipeline building Recording: youtu.be/azej1P17w9E Slides & samples: github.com/mrphrazer/bina…
YouTube video
YouTube
Tim Blazytko tweet media
English
2
91
304
16K
+NCR/CRC! [ReVeRsEr] retweetledi
rootsecdev
rootsecdev@rootsecdev·
I too woke up and choose violence today as the fail-copy POC dropped. Made a clean exploit including fixing the UID post exploitation without rebooting the target server. Smoke those CTF’s in hack the box. github.com/rootsecdev/cve…
English
4
117
560
33.6K