Enes Şakir Çolak

126 posts

Enes Şakir Çolak banner
Enes Şakir Çolak

Enes Şakir Çolak

@enessakircolak

Reverse Engineering

Katılım Ağustos 2019
285 Takip Edilen176 Takipçiler
Enes Şakir Çolak retweetledi
Atahan
Atahan@0xIr0h·
Checkout my latest blog on fixing the mimikatz for windows 11 24H2 @tanrikuluatahan/fixing-mimikatz-sekurlsa-logonpasswords-on-windows-11-24h2-25h2-253e82866197" target="_blank" rel="nofollow noopener">medium.com/@tanrikuluatah
English
2
5
10
661
Enes Şakir Çolak retweetledi
blueblue
blueblue@piedpiper1616·
GitHub - Nightmare-Eclipse/BlueHammer: Repository hosting the bluehammer vulnerability · GitHub - github.com/Nightmare-Ecli…
English
0
2
7
748
Enes Şakir Çolak retweetledi
impulsive
impulsive@weezerOSINT·
github.com/magicsword-io/… found a 21KB kernel driver from 2004 built for windows xp that still loads on windows 11 ASTRA64.sys by EnTech Taiwan. signed in 2006, cert expired in 2007, but its timestamped so windows still says "signature verified" 19 years later. the company doesnt exist anymore. 31 IOCTLs with zero validation on anything. arbitrary physmem R/W, port I/O, PCI config R/W, MSR read, interrupt hooking, keyboard injection. no auth gate, no hardware gate, loads on any system with sc.exe not on loldrivers. not on hvci blocklist. no CVE. vendor is dead so you cant even do responsible disclosure. theres nobody to email filed an issue @M_haggis
impulsive tweet mediaimpulsive tweet mediaimpulsive tweet media
English
34
191
2K
166.9K
Enes Şakir Çolak retweetledi
Zero Day Engineering
Zero Day Engineering@zerodayalpha·
⚡️0-Day Alert: Google Chrome RCE + EoP in the wild • CVE-2026-3910: v8 Maglev JIT incorrect write barrier elimination for Smi representation in Phi edge cases => UaF or memory corruption Impact: remote ACE in renderer via JavaScript code. Same structural pattern invariant as seen in a recent WebKit jsc bug. • CVE-2026-3909: Skia glyph cache key collision to out-of-bounds write in GPU process Impact: at least a partial (full on some platforms) Sandbox Escape primitive. Potentially reachable remotely via renderer media formats. In the specific exploit it was likely pushed directly to IPC from a compromised renderer via CVE-2026-3910. Both bugs patched since Chrome 146.0.7680.80 for Windows/Mac and 146.0.7680.80 for Linux
Zero Day Engineering tweet mediaZero Day Engineering tweet mediaZero Day Engineering tweet mediaZero Day Engineering tweet media
English
1
31
173
28.9K
Death
Death@deathorsufferin·
@enessakircolak Thanks for post. I know the challenge doesnt require the shellcode to run on both Windows 10 and Windows 11 but the syscall numbers corresponding to the system in which it runs can be obtained without branching instructions (for example using CMOVcc)
English
2
0
1
259
Enes Şakir Çolak
Enes Şakir Çolak@enessakircolak·
@deathorsufferin Yeah they said this one is the hardest way. I also mentioned on the blog what I'm doing is like "ancient age" :)
English
0
0
0
48
Enes Şakir Çolak
Enes Şakir Çolak@enessakircolak·
Windows Kernel ROP Gadget My latest blog, multi-functional instruction finder in kernel-land (ROP/JOP or any instruction). You can use it in the user-land with a little touch. Reach the blog at the link below -> lnkd.in/dB8GFpjd Alternative-> lnkd.in/dfncGuxj
Enes Şakir Çolak tweet media
English
0
2
5
274
Enes Şakir Çolak retweetledi
ZAYOTEM
ZAYOTEM@zayotem·
⚠️ Yeni sezon raporları yayında! ZAYOTEM 5. Sezon Tersine Mühendislik stajyerleri takım arkadaşlarımız tarafından, popüler zararlı yazılım ailelerin güncel örnekleri başarılı bir şekilde analiz edildi. 👇👇
Türkçe
1
2
10
720