Alexandre Borges
@alexandreborges.bsky.social
đ€ 516
đ„ 60
đ 266
Vulnerability Researcher | Exploit Developer (speaker 3x at DEF CON)
pinned post!
The Exploiting Reversing Series (ERS) currently features 945 pages of exploit development based on real-world targets:
exploitreversing.com
In the coming weeks, I will publish new articles covering exploration in areas such as Windows, Chrome, iOS/macOS, and hypervisors.
#exploit
#exploitation
about 1 month ago
0
1
0
CVE-2026-28910: Breaking macOS App Sandbox Data Containers, TCC, and Hijacking Apps Using Archive Utility:
mysk.blog/2026/05/19/c...
#macOS
#exploitation
#infosec
#informationsecurity
#vulnerability
#cve
#exploit
loading . . .
CVE-2026-28910: Breaking macOS App Sandbox Data Containers, TCC, and Hijacking Apps Using Archive Utility
Until macOS 26.4, Archive Utility had nearly unrestricted filesystem access. Combined with a drag-and-drop sandbox quirk, this let an attacker bypass App Sandbox data containers, Transparency, Consent...
https://mysk.blog/2026/05/19/cve-2026-28910/
about 8 hours ago
0
1
0
FatGid+4: A four-byte type, an eight-byte stride, one root shell.
fatgid.io
#vulnerability
#exploit
#cybersecurity
#informationsecurity
#freebsd
about 12 hours ago
0
1
0
New Age of Collisions: Reading Arbitrary Files Pre-Auth as root in cPanel (CVE-2026-29205): (blog)
slcyber.io/research-cen...
(tool)
github.com/assetnote/cp...
#cve
#vulnerability
#cybersecurity
#informationsecurity
#authentication
loading . . .
New Age of Collisions: Reading Arbitrary Files Pre-Auth as root in cPanel (CVE-2026-29205) âș Searchlight Cyber
Times Are Changing These last few months have been super weird. We've ended up in a situation several times where we have learnt that an exploits life cycle has significantly been reduced due to the i...
https://slcyber.io/research-center/new-age-of-collisions-reading-arbitrary-files-pre-auth-as-root-in-cpanel-cve-2026-29205
3 days ago
0
1
0
Kernel-Exploit-Dojo:
github.com/mito753/Kern...
#kernel
#ctf
#informationsecurity
#infosec
#exploitation
#cybersecurity
#vulnerability
3 days ago
0
2
0
How Kernel Anti-Cheats Work: A Deep Dive into Modern Game Protection:
s4dbrd.github.io/posts/how-ke...
#reverseengineering
#informationsecurity
#cybersecurity
#game
#windows
#kernel
#debugging
11 days ago
0
5
2
Today I am releasing the nineth article in the Exploiting Reversing Series (ERS), which I provide a 106-page deep dive and a comprehensive roadmap for vulnerability exploitation:
exploitreversing.com/2026/04/28/e...
Enjoy the reading and have an excellent day.
#exploit
#exploitdevelopment
23 days ago
0
0
0
Malwoverview 8.0.1 is available:
github.com/alexandrebor...
To update it: python -m pip install -U malwoverview
#threathunting
#malware
#cve
#vulnerability
#cybersecurity
#informationsecurity
#incidentresponse
about 1 month ago
0
1
1
The Exploiting Reversing Series (ERS) currently features 945 pages of exploit development based on real-world targets:
exploitreversing.com
In the coming weeks, I will publish new articles covering exploration in areas such as Windows, Chrome, iOS/macOS, and hypervisors.
#exploit
#exploitation
about 1 month ago
0
1
0
CFPsec is program to list Call For Papers or upcoming Hacking/Security Conferences based on
cfptime.org
website.
github.com/alexandrebor...
To install it: python -m pip install -U cfpsec
#cybersecurity
#informationsecurity
#conferences
about 1 month ago
0
3
0
The eighth article of the Exploiting Reversing Series (ERS) is now live. Titled âExploitation Techniques | CVE-2024-30085 (Part 02)â this 91-page technical guide offers a comprehensive roadmap for vulnerability exploitation:
exploitreversing.com/2026/03/31/e...
#exploit
#exploitation
about 2 months ago
0
2
1
Before dropping my next article (ERS_08), Iâve updated the ERS 06 article (rev C.1):
exploitreversing.com/2026/02/11/e...
This revision features a refined ALPC exploit with a new stage and an extended cleaner stage, ensuring a stable exit and preventing system crashes.
#exploitation
loading . . .
Exploiting Reversing (ER) series: article 06 | A Deep Dive Into Exploiting a Minifilter Driver (N-day)
I am excited to release the extended version of the sixth article in the Exploiting Reversing Series (ERS). Titled âA Deep Dive Into Exploiting a Minifilter Driver (N-day)â this 296-pagâŠ
https://exploitreversing.com/2026/02/11/exploiting-reversing-er-series-article-06/
about 2 months ago
0
2
0
Malwoverview v8.0 (codename: Revolutions) has been released:
github.com/alexandrebor...
To install its complete version: pip install malwoverview[all]
#threathunting
#malware
#vulnerability
#ai
#informationsecurity
#cybersecurity
#cve
2 months ago
0
4
3
Exploiting Reversing (ER) series: article 07 | Exploitation Techniques | CVE-2024-30085 (part 01)
exploitreversing.com/2026/03/04/e...
Enjoy your reading and have an excellent day.
#exploit
#vulnerability
#cve
#exploitation
#infosec
#informationsecurity
#windows
3 months ago
0
1
1
I am excited to release the extended version of the sixth article in the Exploiting Reversing Series (ERS). Titled "A Deep Dive Into Exploiting a Minifilter Driver (N-day)" this 293-page deep dive offers a comprehensive roadmap for vulnerability exploitation:
exploitreversing.com/2026/02/11/e...
3 months ago
0
0
1
The sixth article in the Exploiting Reversing Series (ERS), "A Deep Dive Into Exploiting a Minifilter Driver (N-day)", a 251-page article provides a comprehensive look at a past vulnerability in a mini-filter driver, is available:
exploitreversing.com/2026/02/11/e...
#exploit
#vulnerability
3 months ago
0
2
1
This presentation remains the go-to reference for learning the inner workings of the IDA Pro Hex-Rays decompiler: (video)
www.youtube.com/watch?v=T-Yk...
(article)
i.blackhat.com/us-18/Thu-Au...
#decompiler
#reverseengineer
#informationsecurity
#cybersecurity
loading . . .
Decompiler Internals: Microcode
YouTube video by Black Hat
https://www.youtube.com/watch?v=T-YkhNElvng
3 months ago
0
1
2
[Cryptodev-linux] Page-level UAF exploitation:
nasm.re/posts/crypto...
#linux
#cybersecurity
#informationsecurity
#uaf
#exploitation
#vulnerability
loading . . .
[Cryptodev-linux] Page-level UAF exploitation
IntroductionIn november 2025 I started a fuzzing campaign against cryptodev-linux as part of a school project. I found +10 bugs (UAF, NULL pointer dereferences and integer overflows) and among all of
https://nasm.re/posts/cryptodev-linux-vuln
3 months ago
0
0
0
TP-Link ER605 DDNS Pre-Auth RCE: Chaining CVE-2024-5242, CVE-2024-5243, CVE-2024-5244:
oobs.io/posts/er605-...
#exploit
#vulnerability
#rce
#informationsecurity
#cybersecurity
#infosec
3 months ago
0
0
0
Before Vegas: The âRed Hackersâ Who Shaped Chinaâs Cyber Ecosystem:
ethz.ch/content/dam/...
#cybersecurity
#redteam
#informationsecurity
#threathunting
#exploitation
#infosec
4 months ago
0
0
0
reposted by
Alexandre Borges
Malwoverview 7.0 has been released:
github.com/alexandrebor...
This version introduces a new vulnerability-focused approach, and the first feature is NIST support, which allows listing and searching for registered vulnerabilities.
#vulnerabilities
#cve
#cybersecurity
#informationsecurity
4 months ago
0
0
1
Malwoverview 7.0 has been released:
github.com/alexandrebor...
This version introduces a new vulnerability-focused approach, and the first feature is NIST support, which allows listing and searching for registered vulnerabilities.
#vulnerabilities
#cve
#cybersecurity
#informationsecurity
4 months ago
0
0
1
Phantom Grid: Phantom Grid is an enterprise-grade, kernel-level active defense system that transforms Linux servers into a controlled, deceptive attack surface.
github.com/haidang-info...
#kernel
#linux
#honeypot
#informationsecurity
#cybersecurity
#defense
#ebpf
4 months ago
0
1
0
Achieving remote code execution in LangSmith Playground using unsafe template formatting:
lab.ctbb.show/research/lan...
#webapp
#exploit
#exploitation
#infosec
#informationsecurity
#cybersecurity
#ai
4 months ago
0
0
0
Dangling pointers, fragile memory â from an undisclosed vulnerability to a Pixel 9 Pro escalation:
dawnslab.jd.com/Pixel_9_Pro_...
#android
#vulnerability
#eop
#cybersecurity
#infosec
#informationsecurity
#cve
4 months ago
0
0
0
CVE-2025-32432: Unauthenticated Remote Code Execution in Craft CMS:
www.opswat.com/blog/cve-202...
#exploitation
#cms
#vulnerability
#cybersecurity
#informationsecurity
#cve
loading . . .
CVE-2025-32432: Craft CMS RCE Vulnerability Explained - OPSWAT
Learn about CVE-2025-32432 in Craft CMSâhow the remote code execution vulnerability works, affected versions, exploitation details, and mitigation steps.
https://www.opswat.com/blog/cve-2025-32432-unauthenticated-remote-code-execution-in-craft-cms
4 months ago
0
0
0
Blind trust: what is hidden behind the process of creating your PDF file?
swarm.ptsecurity.com/blind-trust-...
#vulnerability
#cve
#exploitation
#infosec
loading . . .
Blind trust: what is hidden behind the process of creating your PDF file?
Every day, thousands of web services generate PDF (Portable Document Format) filesâbills, contracts, reports. This step is often treated as a technical routine, âjust convert the HTML,â but in practic...
https://swarm.ptsecurity.com/blind-trust-what-is-hidden-behind-the-process-of-creating-your-pdf-file/
5 months ago
0
8
5
MongoBleed explained simply:
bigdata.2minutestreaming.com/p/mongobleed...
#exploit
#exploitation
#cve
#vulnerability
#mongodb
#informationsecurity
#infosec
5 months ago
0
0
0
From Coverage to Causes: Data-Centric Fuzzing for JavaScript Engines: (paper)
arxiv.org/pdf/2512.18102
(project)
github.com/KKGanguly/Da...
#fuzzing
#vulnerability
#javascript
#exploitation
#llm
5 months ago
0
0
0
Callback hell: abusing callbacks, tail-calls, and proxy frames to obfuscate the stack:
klezvirus.github.io/posts/Callba...
#cybersecurity
#infosec
#windows
#reverseengineering
#programming
5 months ago
0
1
1
Announcing hardware-accelerated BitLocker:
techcommunity.microsoft.com/blog/windows...
#crypto
#cybersecurity
#infosec
#informationsecurity
#hacking
#bitlocker
loading . . .
Announcing hardware-accelerated BitLocker - Windows IT Pro Blog
BitLocker takes advantage of the latest and modern SoC and CPU capabilities for better performance and security.
https://techcommunity.microsoft.com/blog/windows-itpro-blog/announcing-hardware-accelerated-bitlocker/4474609
5 months ago
0
0
0
$5 Prompt Finds $2,418 Vulnerability:
new-blog.ch4n3.kr/llm-found-se...
#cybersecurity
#vulnerability
#infosec
#informationsecurity
#bug
loading . . .
How I Found a $2,418 Vulnerabilities with a $5 Prompt
Hi I'm Seokchan Yoon. Currently working for blockchain security audit company Zellic.io and also a member of the security team of Apache Foundation's Airflow project Two months ago, I've twitted by s...
https://new-blog.ch4n3.kr/llm-found-security-issues-from-django-en/
5 months ago
0
0
0
A look at an Android ITW DNG exploit:
projectzero.google/2025/12/andr...
#android
#exploit
#vulnerability
#cybersecurity
#informationsecurity
5 months ago
0
1
0
godap: A complete TUI for LDAP.
github.com/Macmod/godap
#ldap
#cybersecurity
#informationsecurity
#hacking
#redteam
5 months ago
0
2
1
Extending Kernel Race Windows Using '/dev/shm':
faith2dxy.xyz/2025-11-28/e...
#kernel
#linux
#exploitation
#cybersecurity
#infosec
#informationsecurity
loading . . .
Extending Kernel Race Windows Using '/dev/shm'
Recently, I came across this kernelCTF submission where the author mentions a novel technique for extending race windows in the Linux kernel: I learnedâŠ
https://faith2dxy.xyz/2025-11-28/extending_race_window_fallocate/
5 months ago
0
0
0
A look at an Android ITW DNG exploit:
googleprojectzero.blogspot.com/2025/12/a-lo...
#android
#exploit
#vulnerability
#zeroclick
#exploitation
#mobilesecurity
5 months ago
0
2
1
React2Shell Exploits on GitHub:
www.vulncheck.com/blog/react2s...
#react2shell
#exploit
#exploitation
#cybersecurity
#cve
#vulnerability
#nodejs
loading . . .
React2Shell Exploits on GitHub | Blog | VulnCheck
VulnCheck reviewed the full wave of React2Shell exploits published on GitHub, discarding about half as broken or misleading and surfacing several genuinely interesting techniques from the rest. We cur...
https://www.vulncheck.com/blog/react2shell-github
5 months ago
0
0
0
No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE;
modzero.com/en/blog/no-l...
#exploitation
#cve
#rce
#rop
#aslr
#arm
#iot
loading . . .
No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE
https://modzero.com/en/blog/no-leak-no-problem/
5 months ago
0
1
2
This is a really interesting project: it allows you to track all Windows releases/updates, KBs, interact with the file systems associated with them, and even download files.:
oswatcher.github.io/frontend/
#windows
#kb
#updates
#security
#research
6 months ago
1
2
0
N-Able Windows Software Probe Remote Code Execution:
www.securifera.com/blog/2025/12...
#dotnet
#vulnerability
#windows
#hacking
#exploitation
#infosec
#informationsecurity
loading . . .
N-Able (Formerly SolarWinds MSP) Windows Software Probe Remote Code Execution (CVE-2025-11367)
N-Able Windows Software Probe Remote Code Execution Recently I was performing a penetration test using Reverge when an interesting service caught my attention. The banner reported âms .net remoting s...
https://www.securifera.com/blog/2025/12/02/n-able-formerly-solarwinds-msp-windows-software-probe-remote-code-execution-cve-2025-11367/
6 months ago
0
1
0
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478):
slcyber.io/research-cen...
#exploit
#exploitation
#infosec
#informationsecurity
#cve
#rce
#hacking
#deserialization
loading . . .
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478) âș Searchlight Cyber
This morning, an advisory was released for Next.js about a vulnerability that leads to RCE in default configurations, with no prerequisites. The root cause of this issue lies in React Server Component...
https://slcyber.io/research-center/high-fidelity-detection-mechanism-for-rsc-next-js-rce-cve-2025-55182-cve-2025-66478/
6 months ago
0
0
0
reposted by
Alexandre Borges
Nicolas Grégoire
6 months ago
This vulnerability was the inspiration for the first step of the Panel challenge we played during last weekâs Grehack CTF But we found a dumb bypass đ
add a skeleton here at some point
0
4
1
Linux Kernel Explorer:
reverser.dev/linux-kernel...
#linux
#kernel
#programming
#sourcecode
#informationsecurity
6 months ago
0
2
0
MacOS Infection Vector: Using AppleScripts to bypass Gatekeeper:
pberba.github.io/security/202...
#macOS
#infosec
#applescript
#cybersecurity
#exploitation
#hacking
loading . . .
MacOS Infection Vector: Using AppleScripts to bypass Gatekeeper
A look at how threat actors are abusing AppleScript .scpt files to deliver macOS malware, from fake documents to browser update lures, and how these scripts ...
https://pberba.github.io/security/2025/11/11/macos-infection-vector-applescript-bypass-gatekeeper/
6 months ago
0
4
1
Living Off the Land: Windows Post-Exploitation Without Tools:
xbz0n.sh/blog/living-...
#cybersecurity
#windows
#hacking
#hacking
#informationsecurity
loading . . .
Living Off the Land: Windows Post-Exploitation Without Tools
I'll never forget one of my first red team engagements where I learned this lesson the hard way. I'd spent two days carefully phishing my way into a financia...
https://xbz0n.sh/blog/living-off-the-land-windows
6 months ago
0
1
1
Breaking Oracleâs Identity Manager: Pre-Auth RCE (CVE-2025-61757):
slcyber.io/research-cen...
#oracle
#authentication
#vulnerability
#rce
#informationsecurity
#infosec
#cybersecurity
#cve
loading . . .
Breaking Oracleâs Identity Manager: Pre-Auth RCE (CVE-2025-61757) âș Searchlight Cyber
Intro Earlier this year, in January, Oracle Cloud's login service (login.us2.oraclecloud.com) was breachedâthis led to the compromise of 6M records and over 140k Oracle Cloud tenants. Analysis showed ...
https://slcyber.io/research-center/breaking-oracles-identity-manager-pre-auth-rce/
6 months ago
0
3
2
Microsoft ms-photos URI NTLM Leak:
github.com/rubenformati...
#microsoft
#infosec
#vulnerability
#leak
#ntlm
#windows
6 months ago
0
1
0
Rehabilitating Registry Tradecraft with RegRestoreKey:
www.preludesecurity.com/blog/rehabil...
#infosec
#windows
#cybersecurity
#edr
#callback
loading . . .
Rehabilitating Registry Tradecraft with RegRestoreKey | Prelude
Exploring how EDRs detect registry activity, and how modifying registry primitives can bypass ETW and callback-based detection to force deeper defensive change.
https://www.preludesecurity.com/blog/rehabilitating-registry-tradecraft-with-regrestorekey
6 months ago
0
1
0
Introducing HCLI: The Modern Command-Line Interface for IDA:
hex-rays.com/blog/introdu...
#idapro
#interface
#ida
#hcli
#reverseengineering
6 months ago
0
0
0
Injection for an athlete:
swarm.ptsecurity.com/injection-fo...
#android
#vulnerability
#exploitation
#application
#cybersecurity
6 months ago
0
1
0
Living in the Namespace - ft. unshare():
hackmd.io/@0xmadvise/r...
#linux
#vulnerability
#cybersecurity
#exploit
#exploitation
6 months ago
0
0
0
Load more
feeds!
log in