nixhacker - The Reverser's Space
  • Home
  • Security
  • Tutorials
  • RSS/Feeds
  • Topics
  • Authors
  • About Us
  • Follow
    Subscribe to nixhacker - The Reverser's Space
    Get the latest posts delivered right to your inbox
    Great! Check your inbox and click the link to confirm your subscription
    Please enter a valid email address!
  • Log in Sign up
Peeling Back the Layers: Understanding Windows components Architecture through SAC/EMS Reversing
Windows OS

Peeling Back the Layers: Understanding Windows components Architecture through SAC/EMS Reversing

Setting up EMS  ( Emergency Management Services) SAC in Windows running inside Hyper-v
Windows OS

Setting up EMS ( Emergency Management Services) SAC in Windows running inside Hyper-v

Remote Kernel Debugging   Windows virtual machine (Generation 2) using Serial COM running inside Hyper-v
Windows OS

Remote Kernel Debugging Windows virtual machine (Generation 2) using Serial COM running inside Hyper-v

Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 4
Exploit Development

Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 4

7 January 2024
Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 3
Exploit Development

Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 3

7 January 2024
Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 2
Exploit Development

Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 2

7 January 2024
Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 1
Exploit Development

Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 1

7 January 2024
Summary of linux kernel security protections and associated attacks
Linux

Summary of linux kernel security protections and associated attacks

1 January 2023
Uncovering the security protections in MAC - XProtect and MRT
MacOS Security

Uncovering the security protections in MAC - XProtect and MRT

22 February 2022
Uncovering the  security protections in MacOS - Gatekeeper
MacOS Security

Uncovering the security protections in MacOS - Gatekeeper

22 February 2022
Hooking or Monitoring System calls in linux using ftrace
Rootkits

Hooking or Monitoring System calls in linux using ftrace

24 September 2021
Remote debugging windows kernel driver(without symbols) using windbg
Reverse engineering

Remote debugging windows kernel driver(without symbols) using windbg

In this post we are going to learn few tips and tricks to debug a Windows kernel driver without symbols in windbg.
By Shubham Dubey 2 Jul 2021
Firmware security 3: Digging into System management mode (SMM)
Firmware

Firmware security 3: Digging into System management mode (SMM)

In the third part of the series we are going to discuss System management mode (SMM) and it's security. Moreover, We will try to interact with the SMM from our linux system.
By Shubham Dubey 20 Mar 2021
Firmware security 1: Playing with PCI device memory
Firmware

Firmware security 1: Playing with PCI device memory

In this part of the series we will go through the basic of PCI devices and their memory. We will be developing linux kernel driver and using chipsec to analyze the data practically.
By Shubham Dubey 14 Nov 2020
Impact of x64 calling convention in format string exploitation
Exploit Development

Impact of x64 calling convention in format string exploitation

In this post I will try to give you a brief on how format string exploitation can differ in 64 bit architecture due to different calling convention in 64 bit.
By Shubham Dubey 20 Oct 2020

Featured Posts

Uncovering the  security protections in MacOS - Gatekeeper

Uncovering the security protections in MacOS - Gatekeeper

22 February 2022
Firmware security 3: Digging into System management mode (SMM)

Firmware security 3: Digging into System management mode (SMM)

20 March 2021
Firmware security 1: Playing with PCI device memory

Firmware security 1: Playing with PCI device memory

14 November 2020
Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links

Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links

31 July 2020

Newsletter

Stay up to date! Get all the latest & greatest posts delivered straight to your inbox
Great! Check your inbox and click the link to confirm your subscription
Please enter a valid email address!

Tag Cloud

Security (29) Linux (27) Windows OS (21) Tutorial (19) Analysis (15) Reverse engineering (14) Firmware (12) Virtualization (10) Malware (10) Exploit Development (9) Rootkits (8) Intel architecture (7)
  • Contact Us
  • Write For Us
Copyright 2025, nixhacker - The Reverser's Space. All Rights Reserved. Design with by @GodoFredoNinja
nixhacker - The Reverser's Space

  • Home
  • Security
  • Tutorials
  • RSS/Feeds
  • Topics
  • Authors
  • About Us

Log in Sign up

Follow
Search suggestions