Can Bölük

@_can1357

Security researcher and reverse engineer; mostly interested in Windows kernel development and low-level programming. Founder of .

The Netherlands
Vrijeme pridruživanja: lipanj 2012.

Tweetovi

Blokirali ste korisnika/cu @_can1357

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_can1357

  1. proslijedio/la je Tweet
    12. sij

    BattlEye, a popular anti-cheat, has been detecting unknown cheats by using heuristics in combination with the x86 trap flag. This was done to specifically target "The Perfect Injector" by from usermode.

    Prikaži ovu nit
    Poništi
  2. 18. stu 2019.

    I've received this question a lot so wanted to clarify. Do not use Windbg to debug this project, it will not work due to the internals of ByePg. VMWare GDB stub or any other hypervisor will work fine.

    Prikaži ovu nit
    Poništi
  3. 18. stu 2019.

    After an additional week of work, ExHook is finally live. ExHook is a standalone project utilizing ByePgLib allowing you to hook all kernel-to-user exits (SYSCALL or any interrupt) bypassing PatchGuard. Enjoy!

    Prikaži ovu nit
    Poništi
  4. 20. lis 2019.

    Just pushed a SEH module to ByePg, letting you use SEH in manual mapped drivers effectively bypassing another PatchGuard protected mechanism as it protects PsInvertedFunctionTable. System-call hooks coming Soon™.

    Poništi
  5. 19. lis 2019.

    Just published my latest project "ByePg", exposing an entirely new attack surface to PatchGuard/NT and bringing 's InfinityHook back:

    Prikaži ovu nit
    Poništi
  6. 13. svi 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·