Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I am pleased to announce the publication of the sixth article in the Exploiting Reversing Series (ERS).

I am pleased to announce the publication of the sixth article in the Exploiting Reversing Series (ERS).

Scheduled Pinned Locked Moved Uncategorized
exploitexploitationvulnerabilityndayreverseengineer
1 Posts 1 Posters 8 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • alexandreborges@infosec.exchangeA This user is from outside of this forum
    alexandreborges@infosec.exchangeA This user is from outside of this forum
    alexandreborges@infosec.exchange
    wrote last edited by
    #1

    I am pleased to announce the publication of the sixth article in the Exploiting Reversing Series (ERS). Titled "A Deep Dive Into Exploiting a Minifilter Driver (N-day)", this 251-page article provides a comprehensive look at a past vulnerability in a mini-filter driver:

    Link Preview Image
    Exploiting Reversing (ER) series: article 06 | A Deep Dive Into Exploiting a Minifilter Driver (N-day)

    I am excited to release the extended version of the sixth article in the Exploiting Reversing Series (ERS). Titled "A Deep Dive Into Exploiting a Minifilter Driver (N-day)" this 293-page deep dive offers a comprehensive roadmap for vulnerability exploitation: https://exploitreversing.wordpress.com/wp-content/uploads/2026/02/exploit_reversing_06_extended.pdf Key updates in this extended edition: [+] Dual Exploit Strategies: Two distinct exploit versions.[+] Exploit…

    favicon

    Exploit Reversing (exploitreversing.com)

    It guides readers through the entire investigation process—beginning with binary diffing and moving through reverse engineering, deep analysis and proof-of-concept stages into full exploit development.

    I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays SA (@HexRaysSA on X) for their constant and uninterrupted support, which has helped me write these articles over time. 

    I hope this serves as a valuable resource for your research. If you enjoy the content, please feel free to share it or reach out with feedback.

    Have an excellent day!

    #exploit #exploitation #vulnerability #nday #reverseengineering #windows

    Link Preview Image
    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups