Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

‘Reflections on Trusting Trust’, but completely by accident this time

Why anti-cheat software utilize kernel drivers (2020)

Fuzzing an eBPF implementation in Rust

RISC-Y Business: Raging against the reduced machine

Abusing undocumented features to spoof PE section headers

Windows 11: TPMs and Digital Sovereignty

Bootkitting Windows Sandbox

Earn $200K by fuzzing for a weekend: Part 1

Windows 11: TPMs and Digital Sovereignty

secret club

Counter-Strike Global Offsets: reliable remote code execution

Preventing memory inspection on Windows

Windows lockscreen bypass on touchscreen with BitLocker

How Runescape catches botters, and why they didn’t catch me

A look at LLVM: comparing clamp implementations

CVE-2021-30481: Source engine remote code execution via game invites

Escaping VirtualBox 6.1: Part 1

BitLocker Lockscreen Bypass

Hiding execution of unsigned code in Windows system threads

New year, new anti-debug: Don’t Thread On Me

BattlEye client emulation

Windows Telemetry service elevation of privilege

Cracking a commercial anticheat's packet encryption

Introduction to UEFI: Part 1

Why anticheats block overclocking tools

From directory deletion to SYSTEM shell

How Escape from Tarkov ensures game integrity

How anti-cheats detect system emulation

CVEAC-2020: Bypassing EasyAntiCheat integrity checks

Kernel debugging in seconds with Vagrant

More →