Alexandre Borges
@alexandreborges.bsky.social
📤 505
📥 60
📝 242
Vulnerability Researcher | Exploit Developer (speaker 3x at DEF CON)
pinned post!
So far, I have already written 15 articles (1045 pages), which have been published on my blog: blog:
exploitreversing.com
Series: [+] ERS: Exploiting Reversing Series [+] MAS: Malware Analysis Series Enjoy reading and have a great day.
#windows
#iOS
#macOS
#chrome
#kernel
#vulnerability
5 months ago
0
4
3
Blind trust: what is hidden behind the process of creating your PDF file?
swarm.ptsecurity.com/blind-trust-...
#vulnerability
#cve
#exploitation
#infosec
loading . . .
Blind trust: what is hidden behind the process of creating your PDF file?
Every day, thousands of web services generate PDF (Portable Document Format) files—bills, contracts, reports. This step is often treated as a technical routine, “just convert the HTML,” but in practic...
https://swarm.ptsecurity.com/blind-trust-what-is-hidden-behind-the-process-of-creating-your-pdf-file/
7 days ago
0
8
5
MongoBleed explained simply:
bigdata.2minutestreaming.com/p/mongobleed...
#exploit
#exploitation
#cve
#vulnerability
#mongodb
#informationsecurity
#infosec
8 days ago
0
0
0
From Coverage to Causes: Data-Centric Fuzzing for JavaScript Engines: (paper)
arxiv.org/pdf/2512.18102
(project)
github.com/KKGanguly/Da...
#fuzzing
#vulnerability
#javascript
#exploitation
#llm
11 days ago
0
0
0
Callback hell: abusing callbacks, tail-calls, and proxy frames to obfuscate the stack:
klezvirus.github.io/posts/Callba...
#cybersecurity
#infosec
#windows
#reverseengineering
#programming
14 days ago
0
1
1
Announcing hardware-accelerated BitLocker:
techcommunity.microsoft.com/blog/windows...
#crypto
#cybersecurity
#infosec
#informationsecurity
#hacking
#bitlocker
loading . . .
Announcing hardware-accelerated BitLocker - Windows IT Pro Blog
BitLocker takes advantage of the latest and modern SoC and CPU capabilities for better performance and security.
https://techcommunity.microsoft.com/blog/windows-itpro-blog/announcing-hardware-accelerated-bitlocker/4474609
14 days ago
0
0
0
$5 Prompt Finds $2,418 Vulnerability:
new-blog.ch4n3.kr/llm-found-se...
#cybersecurity
#vulnerability
#infosec
#informationsecurity
#bug
loading . . .
How I Found a $2,418 Vulnerabilities with a $5 Prompt
Hi I'm Seokchan Yoon. Currently working for blockchain security audit company Zellic.io and also a member of the security team of Apache Foundation's Airflow project Two months ago, I've twitted by s...
https://new-blog.ch4n3.kr/llm-found-security-issues-from-django-en/
15 days ago
0
0
0
A look at an Android ITW DNG exploit:
projectzero.google/2025/12/andr...
#android
#exploit
#vulnerability
#cybersecurity
#informationsecurity
16 days ago
0
1
0
godap: A complete TUI for LDAP.
github.com/Macmod/godap
#ldap
#cybersecurity
#informationsecurity
#hacking
#redteam
20 days ago
0
2
1
Extending Kernel Race Windows Using '/dev/shm':
faith2dxy.xyz/2025-11-28/e...
#kernel
#linux
#exploitation
#cybersecurity
#infosec
#informationsecurity
loading . . .
Extending Kernel Race Windows Using '/dev/shm'
Recently, I came across this kernelCTF submission where the author mentions a novel technique for extending race windows in the Linux kernel: I learned…
https://faith2dxy.xyz/2025-11-28/extending_race_window_fallocate/
22 days ago
0
0
0
A look at an Android ITW DNG exploit:
googleprojectzero.blogspot.com/2025/12/a-lo...
#android
#exploit
#vulnerability
#zeroclick
#exploitation
#mobilesecurity
24 days ago
0
2
1
React2Shell Exploits on GitHub:
www.vulncheck.com/blog/react2s...
#react2shell
#exploit
#exploitation
#cybersecurity
#cve
#vulnerability
#nodejs
loading . . .
React2Shell Exploits on GitHub | Blog | VulnCheck
VulnCheck reviewed the full wave of React2Shell exploits published on GitHub, discarding about half as broken or misleading and surfacing several genuinely interesting techniques from the rest. We cur...
https://www.vulncheck.com/blog/react2shell-github
25 days ago
0
0
0
No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE;
modzero.com/en/blog/no-l...
#exploitation
#cve
#rce
#rop
#aslr
#arm
#iot
loading . . .
No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE
https://modzero.com/en/blog/no-leak-no-problem/
27 days ago
0
1
2
This is a really interesting project: it allows you to track all Windows releases/updates, KBs, interact with the file systems associated with them, and even download files.:
oswatcher.github.io/frontend/
#windows
#kb
#updates
#security
#research
30 days ago
1
2
0
N-Able Windows Software Probe Remote Code Execution:
www.securifera.com/blog/2025/12...
#dotnet
#vulnerability
#windows
#hacking
#exploitation
#infosec
#informationsecurity
loading . . .
N-Able (Formerly SolarWinds MSP) Windows Software Probe Remote Code Execution (CVE-2025-11367)
N-Able Windows Software Probe Remote Code Execution Recently I was performing a penetration test using Reverge when an interesting service caught my attention. The banner reported “ms .net remoting s...
https://www.securifera.com/blog/2025/12/02/n-able-formerly-solarwinds-msp-windows-software-probe-remote-code-execution-cve-2025-11367/
about 1 month ago
0
1
0
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478):
slcyber.io/research-cen...
#exploit
#exploitation
#infosec
#informationsecurity
#cve
#rce
#hacking
#deserialization
loading . . .
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478) › Searchlight Cyber
This morning, an advisory was released for Next.js about a vulnerability that leads to RCE in default configurations, with no prerequisites. The root cause of this issue lies in React Server Component...
https://slcyber.io/research-center/high-fidelity-detection-mechanism-for-rsc-next-js-rce-cve-2025-55182-cve-2025-66478/
about 1 month ago
0
0
0
reposted by
Alexandre Borges
Nicolas Grégoire
about 1 month ago
This vulnerability was the inspiration for the first step of the Panel challenge we played during last week’s Grehack CTF But we found a dumb bypass 😎
add a skeleton here at some point
0
4
1
Linux Kernel Explorer:
reverser.dev/linux-kernel...
#linux
#kernel
#programming
#sourcecode
#informationsecurity
about 1 month ago
0
2
0
MacOS Infection Vector: Using AppleScripts to bypass Gatekeeper:
pberba.github.io/security/202...
#macOS
#infosec
#applescript
#cybersecurity
#exploitation
#hacking
loading . . .
MacOS Infection Vector: Using AppleScripts to bypass Gatekeeper
A look at how threat actors are abusing AppleScript .scpt files to deliver macOS malware, from fake documents to browser update lures, and how these scripts ...
https://pberba.github.io/security/2025/11/11/macos-infection-vector-applescript-bypass-gatekeeper/
about 1 month ago
0
4
1
Living Off the Land: Windows Post-Exploitation Without Tools:
xbz0n.sh/blog/living-...
#cybersecurity
#windows
#hacking
#hacking
#informationsecurity
loading . . .
Living Off the Land: Windows Post-Exploitation Without Tools
I'll never forget one of my first red team engagements where I learned this lesson the hard way. I'd spent two days carefully phishing my way into a financia...
https://xbz0n.sh/blog/living-off-the-land-windows
about 1 month ago
0
1
1
Breaking Oracle’s Identity Manager: Pre-Auth RCE (CVE-2025-61757):
slcyber.io/research-cen...
#oracle
#authentication
#vulnerability
#rce
#informationsecurity
#infosec
#cybersecurity
#cve
loading . . .
Breaking Oracle’s Identity Manager: Pre-Auth RCE (CVE-2025-61757) › Searchlight Cyber
Intro Earlier this year, in January, Oracle Cloud's login service (login.us2.oraclecloud.com) was breached—this led to the compromise of 6M records and over 140k Oracle Cloud tenants. Analysis showed ...
https://slcyber.io/research-center/breaking-oracles-identity-manager-pre-auth-rce/
about 2 months ago
0
3
2
Microsoft ms-photos URI NTLM Leak:
github.com/rubenformati...
#microsoft
#infosec
#vulnerability
#leak
#ntlm
#windows
about 2 months ago
0
1
0
Rehabilitating Registry Tradecraft with RegRestoreKey:
www.preludesecurity.com/blog/rehabil...
#infosec
#windows
#cybersecurity
#edr
#callback
loading . . .
Rehabilitating Registry Tradecraft with RegRestoreKey | Prelude
Exploring how EDRs detect registry activity, and how modifying registry primitives can bypass ETW and callback-based detection to force deeper defensive change.
https://www.preludesecurity.com/blog/rehabilitating-registry-tradecraft-with-regrestorekey
about 2 months ago
0
1
0
Introducing HCLI: The Modern Command-Line Interface for IDA:
hex-rays.com/blog/introdu...
#idapro
#interface
#ida
#hcli
#reverseengineering
about 2 months ago
0
0
0
Injection for an athlete:
swarm.ptsecurity.com/injection-fo...
#android
#vulnerability
#exploitation
#application
#cybersecurity
about 2 months ago
0
1
0
Living in the Namespace - ft. unshare():
hackmd.io/@0xmadvise/r...
#linux
#vulnerability
#cybersecurity
#exploit
#exploitation
about 2 months ago
0
0
0
Making Serialization Gadgets by Hand - .NET:
www.vulncheck.com/blog/making-...
#dotnet
#infosec
#deserialization
#hacking
#programming
#exploit
#exploitation
loading . . .
Making Serialization Gadgets by Hand - .NET | Blog | VulnCheck
Creating a language-native .NET source for deserialization gadgets
https://www.vulncheck.com/blog/making-dotnet-gadgets
about 2 months ago
0
1
0
Mojo GPU Puzzles:
puzzles.modular.com/introduction...
#crypto
#gpu
#python
#infosec
#informationsecurity
#programming
about 2 months ago
0
2
1
LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices:
unit42.paloaltonetworks.com/landfall-is-...
#exploitation
#spyware
#rce
#infosec
#cybersecurity
#mobilesecurity
#samsung
#android
#rce
#vulnerability
about 2 months ago
0
1
0
Evading Elastic EDR's call stack signatures with call gadgets:
offsec.almond.consulting/evading-elas...
#edr
#hacking
#evasion
#cybersecurity
#informationsecurity
#windows
#programming
#elastic
about 2 months ago
0
0
0
Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer:
starlabs.sg/blog/2025/11...
#cybersecurity
#exploitation
#printer
#exploit
#vulnerability
2 months ago
0
4
1
How an ex-L3Harris Trenchant boss stole and sold cyber exploits to Russia:
techcrunch.com/2025/11/03/h...
#exploit
#exploitation
#zeroday
#infosec
#informationsecurity
#cybersecurity
loading . . .
How an ex-L3Harris Trenchant boss stole and sold cyber exploits to Russia | TechCrunch
Peter Williams sold eight exploits to a Russian zero-day broker by smuggling them from his employer’s highly secured air-gapped network. A court document, plus exclusive reporting by TechCrunch and in...
https://techcrunch.com/2025/11/03/how-an-ex-l3-harris-trenchant-boss-stole-and-sold-cyber-exploits-to-russia/
2 months ago
0
3
3
Operation South Star: 0-day Espionage Campaign Targeting Domestic Mobile Phones:
ti.qianxin.com/blog/article...
#exploitation
#exploit
#threathunting
#infosec
#vulnerability
#mobile
#0day
#dfir
2 months ago
0
1
0
The cryptography behind electronic passports:
blog.trailofbits.com/2025/10/31/t...
#crypto
#informationsecurity
#cybersecurity
#cryptography
2 months ago
0
1
1
WSUS Deserialization Exploit in the Wild (CVE‑2025‑59287):
research.eye.security/wsus-deseria...
#windows
#cve
#exploit
#cybersecurity
#vulnerability
#exploitation
loading . . .
WSUS Deserialization Exploit in the Wild (CVE‑2025‑59287)
Today, our morning coffee was rudely interrupted by a critical alert from a customer’s Windows Server Update Services…
https://research.eye.security/wsus-deserialization-exploit-in-the-wild-cve-2025-59287/
2 months ago
0
2
0
Why nested deserialization is STILL harmful – Magento RCE (CVE-2025-54236):
slcyber.io/assetnote-se...
#infosec
#cybersecurity
#deserialization
#rce
#exploit
#exploitation
#cve
2 months ago
0
2
0
Key IOCs for Pegasus and Predator Spyware Cleaned With iOS 26 Update:
iverify.io/blog/key-ioc...
#cybersecurity
#infosec
#pegasus
#ios
#spyware
#dfir
#digitalforensics
#threathunting
loading . . .
Key IOCs for Pegasus and Predator Spyware Cleaned With iOS 26 Update
iOS 26 changes how shutdown logs are handled, erasing key evidence of Pegasus and Predator spyware, creating new challenges for forensic investigators
https://iverify.io/blog/key-iocs-for-pegasus-and-predator-spyware-cleaned-with-ios-26-update
2 months ago
0
5
2
Implementing a Persistent Key-Value Store in a Tamper-Resistant Device for SGX Enclave Applications:
dl.acm.org/doi/abs/10.1...
#sgx
#cybersecurity
#dataprotection
#enclave
#informationsecurity
3 months ago
0
1
0
Complete WebSocket Traffic Control with advanced proxy, simulation, and blocking capabilities:
github.com/law-chain-ho...
#websocket
#proxy
#cyberattack
#webapp
#infosec
#cybersecurity
loading . . .
GitHub - law-chain-hot/websocket-devtools: Complete WebSocket Traffic Control with advanced proxy, simulation, and blocking capabilities|专业的WebSocket调试工具,提供监控、消息模拟和流量拦截等功能
Complete WebSocket Traffic Control with advanced proxy, simulation, and blocking capabilities|专业的WebSocket调试工具,提供监控、消息模拟和流量拦截等功能 - law-chain-hot/websocket-devtools
https://github.com/law-chain-hot/websocket-devtools
3 months ago
0
2
0
Memory Allocation in Go:
nghiant3223.github.io/2025/06/03/m...
#cybersecurity
#informationsecurity
#internals
#golang
#memory
3 months ago
1
4
1
Fantastic Rootkits: And Where to Find Them: + part_1:
www.cyberark.com/resources/al...
+ part_2:
www.cyberark.com/resources/al...
+ part_3:
www.cyberark.com/resources/th...
#rootkit
#windows
#cybersecurity
#malware
#arm
#informationsecurity
4 months ago
0
0
0
Race Against Time in the Kernel’s Clockwork:
streypaws.github.io/posts/Race-A...
#kernel
#vulnerability
#linux
#cybersecurity
#exploitation
#informationsecurity
#android
4 months ago
0
1
0
Anatomy of a Billion-Download NPM Supply-Chain Attack:
jdstaerk.substack.com/p/we-just-fo...
github.com/Qix-/node-er...
#supplychainattack
#npm
#cybersecurity
#malware
#informationsecurity
4 months ago
0
0
0
Secondary Context Path Traversal in Omnissa Workspace ONE UEM:
slcyber.io/assetnote-se...
#cybersecurity
#vulnerability
#hacking
#securecode
#exploitation
4 months ago
0
1
0
A Novel Technique for SQL Injection in PDO’s Prepared Statements:
slcyber.io/assetnote-se...
#cybersecurity
#hacking
#websecurity
#webapp
#pentest
#sql
4 months ago
0
1
0
What is a CUDA Device Architecture?
modal.com/gpu-glossary...
#gpu
#hardware
#documentation
#informationsecurity
#cuda
5 months ago
1
0
0
So far, I have already written 15 articles (1045 pages), which have been published on my blog: blog:
exploitreversing.com
Series: [+] ERS: Exploiting Reversing Series [+] MAS: Malware Analysis Series Enjoy reading and have a great day.
#windows
#iOS
#macOS
#chrome
#kernel
#vulnerability
5 months ago
0
4
3
Malwoverview version 6.2 has been released:
github.com/alexandrebor...
Read the project page to learn how to adapt the configuration file to the changes. Note: Updating Malwoverview using pip is not enough.
#threathunting
#dfir
#malware
#incidentresponse
5 months ago
0
1
0
[CVE-2025-38001] Exploiting All Google kernelCTF Instances And Debian 12 With A 0-Day For $82k: A RBTree Family Drama (Part One: LTS & COS):
syst3mfailure.io/rbtree-famil...
#cybersecurity
#informationsecurity
#exploitation
#google
#kernel
#linux
#cybersecurity
#zeroday
6 months ago
0
0
1
Abusing Windows, .NET quirks, and Unicode Normalization to exploit DNN (DotNetNuke):
slcyber.io/assetnote-se...
#dotnet
#infosec
#informationsecurity
#cybersecurity
#exploitation
#exploit
loading . . .
Abusing Windows, .NET quirks, and Unicode Normalization to exploit DNN (DotNetNuke) › Searchlight Cyber
A pre-authentication vulnerability exists within DotNetNuke versions 6.0 to 10.0.1, assigned CVE-2025-52488, that allows attackers to steal NTLM hashes.
https://slcyber.io/assetnote-security-research-center/abusing-windows-net-quirks-and-unicode-normalization-to-exploit-dnn-dotnetnuke/
6 months ago
0
1
0
Pwning Solana for Fun and Profit - Exploiting a Subtle Rust Bug for Validator RCE and Money-Printing:
anatomi.st/blog/2025_06...
#cybersecurity
#exploiting
#exploitation
#infosec
#informationsecurity
#rce
#web3
#rust
6 months ago
0
3
1
Load more
feeds!
log in