Subscribe to Nixhacker - The Reverser's Space
Get the latest posts delivered right to your inbox
Check your inbox and click the link to confirm your subscription
Please enter a valid email address!
22 February 2022
Uncovering the security protections in MAC - XProtect and MRT
22 February 2022
Uncovering the security protections in MacOS - Gatekeeper
24 September 2021
Hooking or Monitoring System calls in linux using ftrace
2 July 2021
Remote debugging windows kernel driver(without symbols) using windbg
20 March 2021
Firmware security 3: Digging into System management mode (SMM)
14 November 2020
Firmware security 1: Playing with PCI device memory
20 October 2020
Impact of x64 calling convention in format string exploitation
5 August 2020
Fixing DLL exports for DLL hijacking(DLL proxy)
31 July 2020
Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links
10 June 2020
Developing and Installing your first Kernel driver in Windows 10(under 10 min)
28 April 2020
Breaking Antivirus: Arbitrary file deletion using Symbolic link
16 April 2020
Understanding and Exploiting Symbolic links in Windows - Symlink Attack EOP
Symbolic link can be abused to cause elevation of privilege or arbitrary write/delete. In this article we are going to understand symlink and will learn how to exploit/abuse them.
21 February 2020
Segmentation in Intel x64(IA-32e) architecture - explained using Linux
In this article we will go through Segmentation in basic and cover it for x64 (IA-32e) processors by extracting the details inside a Linux system.
26 December 2019
Malware analysis interview questions with detailed answers (Part 4)
In this part we will discuss advance as well as miscellaneous questions for malware analysis interview. Even if you are already an experienced researcher, still these questions can be helpful for learning some new stuff.
12 November 2019
Developing hypervisor from scratch: Part 4 - Setting up HOST and GUEST State
In this article series you are going to learn how to develop your own hypervisor for virtualization in linux ecosystem. In this part we will do the setup of HOST and GUEST state area and at last the vmlaunch.
No results found
Go to article
Search new term
You've successfully subscribed to Nixhacker - The Reverser's Space
Great! Next, complete checkout for full access to Nixhacker - The Reverser's Space
Welcome back! You've successfully signed in
Success! Your account is fully activated, you now have access to all content.