Alexandre Borges
@alexandreborges.bsky.social
📤 515
📥 60
📝 253
Vulnerability Researcher | Exploit Developer (speaker 3x at DEF CON)
pinned post!
The sixth article in the Exploiting Reversing Series (ERS), "A Deep Dive Into Exploiting a Minifilter Driver (N-day)", a 251-page article provides a comprehensive look at a past vulnerability in a mini-filter driver, is available:
exploitreversing.com/2026/02/11/e...
#exploit
#vulnerability
16 days ago
0
2
1
I am excited to release the extended version of the sixth article in the Exploiting Reversing Series (ERS). Titled "A Deep Dive Into Exploiting a Minifilter Driver (N-day)" this 293-page deep dive offers a comprehensive roadmap for vulnerability exploitation:
exploitreversing.com/2026/02/11/e...
11 days ago
0
0
1
The sixth article in the Exploiting Reversing Series (ERS), "A Deep Dive Into Exploiting a Minifilter Driver (N-day)", a 251-page article provides a comprehensive look at a past vulnerability in a mini-filter driver, is available:
exploitreversing.com/2026/02/11/e...
#exploit
#vulnerability
16 days ago
0
2
1
This presentation remains the go-to reference for learning the inner workings of the IDA Pro Hex-Rays decompiler: (video)
www.youtube.com/watch?v=T-Yk...
(article)
i.blackhat.com/us-18/Thu-Au...
#decompiler
#reverseengineer
#informationsecurity
#cybersecurity
loading . . .
Decompiler Internals: Microcode
YouTube video by Black Hat
https://www.youtube.com/watch?v=T-YkhNElvng
19 days ago
0
1
2
[Cryptodev-linux] Page-level UAF exploitation:
nasm.re/posts/crypto...
#linux
#cybersecurity
#informationsecurity
#uaf
#exploitation
#vulnerability
loading . . .
[Cryptodev-linux] Page-level UAF exploitation
IntroductionIn november 2025 I started a fuzzing campaign against cryptodev-linux as part of a school project. I found +10 bugs (UAF, NULL pointer dereferences and integer overflows) and among all of
https://nasm.re/posts/cryptodev-linux-vuln
20 days ago
0
0
0
TP-Link ER605 DDNS Pre-Auth RCE: Chaining CVE-2024-5242, CVE-2024-5243, CVE-2024-5244:
oobs.io/posts/er605-...
#exploit
#vulnerability
#rce
#informationsecurity
#cybersecurity
#infosec
20 days ago
0
0
0
Before Vegas: The “Red Hackers” Who Shaped China’s Cyber Ecosystem:
ethz.ch/content/dam/...
#cybersecurity
#redteam
#informationsecurity
#threathunting
#exploitation
#infosec
about 1 month ago
0
0
0
reposted by
Alexandre Borges
Malwoverview 7.0 has been released:
github.com/alexandrebor...
This version introduces a new vulnerability-focused approach, and the first feature is NIST support, which allows listing and searching for registered vulnerabilities.
#vulnerabilities
#cve
#cybersecurity
#informationsecurity
about 1 month ago
0
0
1
Malwoverview 7.0 has been released:
github.com/alexandrebor...
This version introduces a new vulnerability-focused approach, and the first feature is NIST support, which allows listing and searching for registered vulnerabilities.
#vulnerabilities
#cve
#cybersecurity
#informationsecurity
about 1 month ago
0
0
1
Phantom Grid: Phantom Grid is an enterprise-grade, kernel-level active defense system that transforms Linux servers into a controlled, deceptive attack surface.
github.com/haidang-info...
#kernel
#linux
#honeypot
#informationsecurity
#cybersecurity
#defense
#ebpf
about 1 month ago
0
1
0
Achieving remote code execution in LangSmith Playground using unsafe template formatting:
lab.ctbb.show/research/lan...
#webapp
#exploit
#exploitation
#infosec
#informationsecurity
#cybersecurity
#ai
about 2 months ago
0
0
0
Dangling pointers, fragile memory – from an undisclosed vulnerability to a Pixel 9 Pro escalation:
dawnslab.jd.com/Pixel_9_Pro_...
#android
#vulnerability
#eop
#cybersecurity
#infosec
#informationsecurity
#cve
about 2 months ago
0
0
0
CVE-2025-32432: Unauthenticated Remote Code Execution in Craft CMS:
www.opswat.com/blog/cve-202...
#exploitation
#cms
#vulnerability
#cybersecurity
#informationsecurity
#cve
loading . . .
CVE-2025-32432: Craft CMS RCE Vulnerability Explained - OPSWAT
Learn about CVE-2025-32432 in Craft CMS—how the remote code execution vulnerability works, affected versions, exploitation details, and mitigation steps.
https://www.opswat.com/blog/cve-2025-32432-unauthenticated-remote-code-execution-in-craft-cms
about 2 months ago
0
0
0
Blind trust: what is hidden behind the process of creating your PDF file?
swarm.ptsecurity.com/blind-trust-...
#vulnerability
#cve
#exploitation
#infosec
loading . . .
Blind trust: what is hidden behind the process of creating your PDF file?
Every day, thousands of web services generate PDF (Portable Document Format) files—bills, contracts, reports. This step is often treated as a technical routine, “just convert the HTML,” but in practic...
https://swarm.ptsecurity.com/blind-trust-what-is-hidden-behind-the-process-of-creating-your-pdf-file/
about 2 months ago
0
8
5
MongoBleed explained simply:
bigdata.2minutestreaming.com/p/mongobleed...
#exploit
#exploitation
#cve
#vulnerability
#mongodb
#informationsecurity
#infosec
2 months ago
0
0
0
From Coverage to Causes: Data-Centric Fuzzing for JavaScript Engines: (paper)
arxiv.org/pdf/2512.18102
(project)
github.com/KKGanguly/Da...
#fuzzing
#vulnerability
#javascript
#exploitation
#llm
2 months ago
0
0
0
Callback hell: abusing callbacks, tail-calls, and proxy frames to obfuscate the stack:
klezvirus.github.io/posts/Callba...
#cybersecurity
#infosec
#windows
#reverseengineering
#programming
2 months ago
0
1
1
Announcing hardware-accelerated BitLocker:
techcommunity.microsoft.com/blog/windows...
#crypto
#cybersecurity
#infosec
#informationsecurity
#hacking
#bitlocker
loading . . .
Announcing hardware-accelerated BitLocker - Windows IT Pro Blog
BitLocker takes advantage of the latest and modern SoC and CPU capabilities for better performance and security.
https://techcommunity.microsoft.com/blog/windows-itpro-blog/announcing-hardware-accelerated-bitlocker/4474609
2 months ago
0
0
0
$5 Prompt Finds $2,418 Vulnerability:
new-blog.ch4n3.kr/llm-found-se...
#cybersecurity
#vulnerability
#infosec
#informationsecurity
#bug
loading . . .
How I Found a $2,418 Vulnerabilities with a $5 Prompt
Hi I'm Seokchan Yoon. Currently working for blockchain security audit company Zellic.io and also a member of the security team of Apache Foundation's Airflow project Two months ago, I've twitted by s...
https://new-blog.ch4n3.kr/llm-found-security-issues-from-django-en/
2 months ago
0
0
0
A look at an Android ITW DNG exploit:
projectzero.google/2025/12/andr...
#android
#exploit
#vulnerability
#cybersecurity
#informationsecurity
2 months ago
0
1
0
godap: A complete TUI for LDAP.
github.com/Macmod/godap
#ldap
#cybersecurity
#informationsecurity
#hacking
#redteam
2 months ago
0
2
1
Extending Kernel Race Windows Using '/dev/shm':
faith2dxy.xyz/2025-11-28/e...
#kernel
#linux
#exploitation
#cybersecurity
#infosec
#informationsecurity
loading . . .
Extending Kernel Race Windows Using '/dev/shm'
Recently, I came across this kernelCTF submission where the author mentions a novel technique for extending race windows in the Linux kernel: I learned…
https://faith2dxy.xyz/2025-11-28/extending_race_window_fallocate/
2 months ago
0
0
0
A look at an Android ITW DNG exploit:
googleprojectzero.blogspot.com/2025/12/a-lo...
#android
#exploit
#vulnerability
#zeroclick
#exploitation
#mobilesecurity
3 months ago
0
2
1
React2Shell Exploits on GitHub:
www.vulncheck.com/blog/react2s...
#react2shell
#exploit
#exploitation
#cybersecurity
#cve
#vulnerability
#nodejs
loading . . .
React2Shell Exploits on GitHub | Blog | VulnCheck
VulnCheck reviewed the full wave of React2Shell exploits published on GitHub, discarding about half as broken or misleading and surfacing several genuinely interesting techniques from the rest. We cur...
https://www.vulncheck.com/blog/react2shell-github
3 months ago
0
0
0
No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE;
modzero.com/en/blog/no-l...
#exploitation
#cve
#rce
#rop
#aslr
#arm
#iot
loading . . .
No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE
https://modzero.com/en/blog/no-leak-no-problem/
3 months ago
0
1
2
This is a really interesting project: it allows you to track all Windows releases/updates, KBs, interact with the file systems associated with them, and even download files.:
oswatcher.github.io/frontend/
#windows
#kb
#updates
#security
#research
3 months ago
1
2
0
N-Able Windows Software Probe Remote Code Execution:
www.securifera.com/blog/2025/12...
#dotnet
#vulnerability
#windows
#hacking
#exploitation
#infosec
#informationsecurity
loading . . .
N-Able (Formerly SolarWinds MSP) Windows Software Probe Remote Code Execution (CVE-2025-11367)
N-Able Windows Software Probe Remote Code Execution Recently I was performing a penetration test using Reverge when an interesting service caught my attention. The banner reported “ms .net remoting s...
https://www.securifera.com/blog/2025/12/02/n-able-formerly-solarwinds-msp-windows-software-probe-remote-code-execution-cve-2025-11367/
3 months ago
0
1
0
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478):
slcyber.io/research-cen...
#exploit
#exploitation
#infosec
#informationsecurity
#cve
#rce
#hacking
#deserialization
loading . . .
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478) › Searchlight Cyber
This morning, an advisory was released for Next.js about a vulnerability that leads to RCE in default configurations, with no prerequisites. The root cause of this issue lies in React Server Component...
https://slcyber.io/research-center/high-fidelity-detection-mechanism-for-rsc-next-js-rce-cve-2025-55182-cve-2025-66478/
3 months ago
0
0
0
reposted by
Alexandre Borges
Nicolas Grégoire
3 months ago
This vulnerability was the inspiration for the first step of the Panel challenge we played during last week’s Grehack CTF But we found a dumb bypass 😎
add a skeleton here at some point
0
4
1
Linux Kernel Explorer:
reverser.dev/linux-kernel...
#linux
#kernel
#programming
#sourcecode
#informationsecurity
3 months ago
0
2
0
MacOS Infection Vector: Using AppleScripts to bypass Gatekeeper:
pberba.github.io/security/202...
#macOS
#infosec
#applescript
#cybersecurity
#exploitation
#hacking
loading . . .
MacOS Infection Vector: Using AppleScripts to bypass Gatekeeper
A look at how threat actors are abusing AppleScript .scpt files to deliver macOS malware, from fake documents to browser update lures, and how these scripts ...
https://pberba.github.io/security/2025/11/11/macos-infection-vector-applescript-bypass-gatekeeper/
3 months ago
0
4
1
Living Off the Land: Windows Post-Exploitation Without Tools:
xbz0n.sh/blog/living-...
#cybersecurity
#windows
#hacking
#hacking
#informationsecurity
loading . . .
Living Off the Land: Windows Post-Exploitation Without Tools
I'll never forget one of my first red team engagements where I learned this lesson the hard way. I'd spent two days carefully phishing my way into a financia...
https://xbz0n.sh/blog/living-off-the-land-windows
3 months ago
0
1
1
Breaking Oracle’s Identity Manager: Pre-Auth RCE (CVE-2025-61757):
slcyber.io/research-cen...
#oracle
#authentication
#vulnerability
#rce
#informationsecurity
#infosec
#cybersecurity
#cve
loading . . .
Breaking Oracle’s Identity Manager: Pre-Auth RCE (CVE-2025-61757) › Searchlight Cyber
Intro Earlier this year, in January, Oracle Cloud's login service (login.us2.oraclecloud.com) was breached—this led to the compromise of 6M records and over 140k Oracle Cloud tenants. Analysis showed ...
https://slcyber.io/research-center/breaking-oracles-identity-manager-pre-auth-rce/
3 months ago
0
3
2
Microsoft ms-photos URI NTLM Leak:
github.com/rubenformati...
#microsoft
#infosec
#vulnerability
#leak
#ntlm
#windows
3 months ago
0
1
0
Rehabilitating Registry Tradecraft with RegRestoreKey:
www.preludesecurity.com/blog/rehabil...
#infosec
#windows
#cybersecurity
#edr
#callback
loading . . .
Rehabilitating Registry Tradecraft with RegRestoreKey | Prelude
Exploring how EDRs detect registry activity, and how modifying registry primitives can bypass ETW and callback-based detection to force deeper defensive change.
https://www.preludesecurity.com/blog/rehabilitating-registry-tradecraft-with-regrestorekey
3 months ago
0
1
0
Introducing HCLI: The Modern Command-Line Interface for IDA:
hex-rays.com/blog/introdu...
#idapro
#interface
#ida
#hcli
#reverseengineering
3 months ago
0
0
0
Injection for an athlete:
swarm.ptsecurity.com/injection-fo...
#android
#vulnerability
#exploitation
#application
#cybersecurity
3 months ago
0
1
0
Living in the Namespace - ft. unshare():
hackmd.io/@0xmadvise/r...
#linux
#vulnerability
#cybersecurity
#exploit
#exploitation
4 months ago
0
0
0
Making Serialization Gadgets by Hand - .NET:
www.vulncheck.com/blog/making-...
#dotnet
#infosec
#deserialization
#hacking
#programming
#exploit
#exploitation
loading . . .
Making Serialization Gadgets by Hand - .NET | Blog | VulnCheck
Creating a language-native .NET source for deserialization gadgets
https://www.vulncheck.com/blog/making-dotnet-gadgets
4 months ago
0
1
0
Mojo GPU Puzzles:
puzzles.modular.com/introduction...
#crypto
#gpu
#python
#infosec
#informationsecurity
#programming
4 months ago
0
2
1
LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices:
unit42.paloaltonetworks.com/landfall-is-...
#exploitation
#spyware
#rce
#infosec
#cybersecurity
#mobilesecurity
#samsung
#android
#rce
#vulnerability
4 months ago
0
1
0
Evading Elastic EDR's call stack signatures with call gadgets:
offsec.almond.consulting/evading-elas...
#edr
#hacking
#evasion
#cybersecurity
#informationsecurity
#windows
#programming
#elastic
4 months ago
0
0
0
Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer:
starlabs.sg/blog/2025/11...
#cybersecurity
#exploitation
#printer
#exploit
#vulnerability
4 months ago
0
4
1
How an ex-L3Harris Trenchant boss stole and sold cyber exploits to Russia:
techcrunch.com/2025/11/03/h...
#exploit
#exploitation
#zeroday
#infosec
#informationsecurity
#cybersecurity
loading . . .
How an ex-L3Harris Trenchant boss stole and sold cyber exploits to Russia | TechCrunch
Peter Williams sold eight exploits to a Russian zero-day broker by smuggling them from his employer’s highly secured air-gapped network. A court document, plus exclusive reporting by TechCrunch and in...
https://techcrunch.com/2025/11/03/how-an-ex-l3-harris-trenchant-boss-stole-and-sold-cyber-exploits-to-russia/
4 months ago
0
3
3
Operation South Star: 0-day Espionage Campaign Targeting Domestic Mobile Phones:
ti.qianxin.com/blog/article...
#exploitation
#exploit
#threathunting
#infosec
#vulnerability
#mobile
#0day
#dfir
4 months ago
0
1
0
The cryptography behind electronic passports:
blog.trailofbits.com/2025/10/31/t...
#crypto
#informationsecurity
#cybersecurity
#cryptography
4 months ago
0
1
1
WSUS Deserialization Exploit in the Wild (CVE‑2025‑59287):
research.eye.security/wsus-deseria...
#windows
#cve
#exploit
#cybersecurity
#vulnerability
#exploitation
loading . . .
WSUS Deserialization Exploit in the Wild (CVE‑2025‑59287)
Today, our morning coffee was rudely interrupted by a critical alert from a customer’s Windows Server Update Services…
https://research.eye.security/wsus-deserialization-exploit-in-the-wild-cve-2025-59287/
4 months ago
0
2
0
Why nested deserialization is STILL harmful – Magento RCE (CVE-2025-54236):
slcyber.io/assetnote-se...
#infosec
#cybersecurity
#deserialization
#rce
#exploit
#exploitation
#cve
4 months ago
0
2
0
Key IOCs for Pegasus and Predator Spyware Cleaned With iOS 26 Update:
iverify.io/blog/key-ioc...
#cybersecurity
#infosec
#pegasus
#ios
#spyware
#dfir
#digitalforensics
#threathunting
loading . . .
Key IOCs for Pegasus and Predator Spyware Cleaned With iOS 26 Update
iOS 26 changes how shutdown logs are handled, erasing key evidence of Pegasus and Predator spyware, creating new challenges for forensic investigators
https://iverify.io/blog/key-iocs-for-pegasus-and-predator-spyware-cleaned-with-ios-26-update
4 months ago
0
5
2
Implementing a Persistent Key-Value Store in a Tamper-Resistant Device for SGX Enclave Applications:
dl.acm.org/doi/abs/10.1...
#sgx
#cybersecurity
#dataprotection
#enclave
#informationsecurity
4 months ago
0
1
0
Complete WebSocket Traffic Control with advanced proxy, simulation, and blocking capabilities:
github.com/law-chain-ho...
#websocket
#proxy
#cyberattack
#webapp
#infosec
#cybersecurity
loading . . .
GitHub - law-chain-hot/websocket-devtools: Complete WebSocket Traffic Control with advanced proxy, simulation, and blocking capabilities|专业的WebSocket调试工具,提供监控、消息模拟和流量拦截等功能
Complete WebSocket Traffic Control with advanced proxy, simulation, and blocking capabilities|专业的WebSocket调试工具,提供监控、消息模拟和流量拦截等功能 - law-chain-hot/websocket-devtools
https://github.com/law-chain-hot/websocket-devtools
5 months ago
0
2
0
Load more
feeds!
log in