![Daax Profile](https://pbs.twimg.com/profile_images/1580375852038213632/lLgAW8eP_x96.jpg)
Daax
@daaximus
Followers
11K
Following
7K
Statuses
3K
reverse engineering • secure processor design • system emulation • strategically bluescreening @the_secret_club @daax.bsky.social
United Steaks - South
Joined May 2018
RT @alexjplaskett: Two new side-channel attacks against Apple CPUs that can leak sensitive data from the processor's memory SLAP (Speculat…
0
16
0
RT @AlanSguigna: SourcePoint WinDbg + Intel Processor Trace + IDA debugging the Secure Kernel. New blog content forthcoming.
0
23
0
Some notes: “Earlier versions would run” — prior to Windows 7. AutoRun was disabled by default in Windows 7 following some updates. If you’re on Windows or later, you have to make the click. An installer, unarchiving itself, copying the driver installer, running it, and then deleting itself is par for the course with all installers. InstallShield also does this more or less. I don’t really see how this behavior is sketchy. It’s standard for simple devices so they don’t have to ship modules separately or require the user to go dig through their site for the binaries.
1
0
6
If you’re looking to hire a dedicated researcher, I believe this guy should be on your list. I continuously see Samuel posting new project after new project chasing a deeper understanding of the OS and architecture; and applying it as a means to a novel end. Unbridled passion for the subject matter is invaluable to any team.
Protecting processes PML4 address using a global kernel exception hook. Does not trigger PatchGuard and is compatible with HVCI. Bit unstable, does not handle any edge cases at all, just wanted to experiment with it a little.
2
6
71
@tulachsam The power of global exception hooks is unrivaled still. A few anti-cheat(s) love them, the others need to get onboard. Nice project mate.
1
0
10
RT @elasticseclabs: Interested in Windows emulators? @x86matthew is showcasing WinVisor, an emulator for Windows x64 binaries that utilizes…
0
35
0
RT @x86matthew: I created a hypervisor-based emulator for Windows x64 binaries. This project uses Windows Hypervisor Platform to build a vi…
0
349
0
RT @lcheylus: BinaryShield: an open-source, bin-to-bin x86-64 Code Virtualizer designed to offer strong protection against #ReverseEngineer…
0
17
0
RT @offensive_con: Rolf Rolles (@RolfRolles) will be teaching his ‘Static Analysis of C++’ training in this year’s Offensivecon. Sign up…
0
10
0
RT @hackermondev: Research into a unique 0-click deanonymization exploit targeting Signal, Discord and hundreds of platform 🧵 https://t.co/…
0
537
0
RT @ssnossnossno: I spent the last month reverse engineering Call of Duty's anti-cheat! Blog post here:
0
372
0
RT @errno_fail: CrashXTS (CVE-2025-21210): a practical randomization attack against BitLocker (AES-XTS) It's possible to find and corrupt…
0
6
0
@johannymoreno2 @AnInsaneOstrich @PhillyD Not an anon account, you gotta be blind to not spot this out as over the line — regardless of political affiliation.
0
0
2