![Nicolas D Profile](https://pbs.twimg.com/profile_images/1160581916149583872/GGHK56rZ_x96.jpg)
Nicolas D
@_Homeostasie_
Followers
523
Following
423
Statuses
266
Security Researcher. Reversing for finding and exploiting various bugs. Mainly focused on Windows both user and kernel. Combining security improvement with fun.
France
Joined December 2018
RT @_0xDeku: If you have not checked it out yet, Windows Downdate tool is live! You can use it to take over Windows Updates to downgrade an…
0
159
0
RT @waleedassar: I am releasing my kernel fuzzer "SimpleNTSyscallFuzzer" for public use. With the help of this generic fuzzer, i managed to…
0
134
0
RT @saab_sec: Blog Post Alert: Tale of Code Integrity & Driver Loads 🔸Reversing sc.exe and MS-SCMR 🔸Some RPC internals 🔸Debugging PPL proc…
0
21
0
RT @0xor0ne: This is an excellent series on virtualization and internals of various solutions (QEMU, Xen and VMWare) Credits @LordNoteworth…
0
143
0
RT @DebugPrivilege: I did two write-ups about ETW. The first one will cover how to capture an ETW trace and covers a case-study using the W…
0
86
0
RT @aflplusplus: The recording of our #37c3 talk "Fuzz Everything, Everywhere, All at Once - Advanced QEMU-based fuzzing" can be found here…
0
72
0
RT @jsecurity101: It’s very common for us to see offensive tooling enable SeDebugPrivilege so that they may bypass certain OS checks. Howev…
0
96
0
RT @akamai_research: Akamai researchers discovered a critical vulnerability in Microsoft Windows Server 2022. This vuln can be triggered by…
0
35
0
RT @quarkslab: Reversing Windows Container, episode I: Silo An exploration of the depths of #Windows #container technology by Quarkslab's e…
0
43
0
RT @AndrewOliveau: 💥BOOM!💥 Another privilege escalation blog, this time showcasing how to convert arbitrary file deletions 🗑️ to SYSTEM com…
0
206
0
RT @quarkslab: Did you know that Windows processes fundamental to Operating System security run in Isolated User Mode and can not be debug…
0
145
0
RT @_ceax: [Tool] Ghidralligator: Emulate and fuzz code running on various CPU architectures (ARM, MIPS, PPC, x86, Apple Silicon M1/M2...)…
0
75
0
RT @Synacktiv: 📱Dive into the inner workings of jemalloc new: one of the libc allocators used on modern #Android devices. Enhance your unde…
0
61
0
RT @akamai_research: Akamai researchers have identified 3 vulnerabilities in MS-RPC runtime, all with a base score of 8.1. In our latest…
0
116
0
RT @mtarral: It's been a while since I've given updates here, especially since I started at Intel one year ago ! I've taken over the maint…
0
47
0
RT @CyberWarship: "Attacking the Android kernel using the Qualcomm TrustZone" #infosec #redteam #pentest
https://…
0
32
0
RT @citronneur: Time Travel Debugging IDA plugin, ttddbg, 1.1.0 is out with new tracing feature ! Based on #IDA database, arguments and ret…
0
29
0