
Exploiting Reversing (ER) series: article 09 | Exploitation Techniques: CVE-2024-30085 (part 03)
Today I am releasing the nineth article in the Exploiting Reversing Series (ERS). In โExploitation Techniques | CVE-2024-30085 (Part 03)โ I provide a 106-page deep dive and a comprehensive roadmap for vulnerability exploitation: https://exploitreversing.com/wp-content/uploads/2026/04/exploit_reversing_09.pdf Key features of this edition: [+] Dual Exploit Strategies: Two distinct exploit editions built on the cldflt.sys heap overflow.[+] PreviousMode Edition:โฆ
Exploiting Reversing (ER) series: article 08 | Exploitation Techniques: CVE-2024-30085 (part 02)
Today I am releasing the eighth article in the Exploiting Reversing Series (ERS). In โExploitation Techniques | CVE-2024-30085 (Part 02)โ I provide a 91-page deep dive and a comprehensive roadmap for vulnerability exploitation: https://exploitreversing.com/wp-content/uploads/2026/03/exploit_reversing_08.pdf Key features of this edition: [+] Dual Exploit Strategies: Two distinct exploit versions leveraging the I/O Ring technique.[+] Exploit ALPC +โฆ
Exploiting Reversing (ER) series: article 07 | Exploitation Techniques: CVE-2024-30085 (part 01)
I am excited to release the seventh article in the Exploiting Reversing Series (ERS). Titled โExploitation Techniques | CVE-2024-30085 (part 01)โ this 119-page technical guide offers a comprehensive roadmap for vulnerability exploitation: https://exploitreversing.com/wp-content/uploads/2026/03/exploit_reversing_07-1.pdf Key features of this edition: [+] Dual Exploit Strategies: Two distinct exploit versions using Token Stealing and I/O Ring techniques.[+] Exploit ALPCโฆ
Exploiting Reversing (ER) series: article 06 | A Deep Dive Into Exploiting a Minifilter Driver (N-day)
I am excited to release the extended version of the sixth article in the Exploiting Reversing Series (ERS). Titled “A Deep Dive Into Exploiting a Minifilter Driver (N-day)” this 296-page deep dive (rev. C1) offers a comprehensive roadmap for vulnerability exploitation: https://exploitreversing.com/wp-content/uploads/2026/03/exploit_reversing_06_extended_rev_c.pdf Key updates in this extended edition: [+] Dual Exploit Strategies: Two distinct exploitโฆ
Exploiting Reversing (ER) series: article 05 | Hyper-V (part 01)
The fifth article (57 pages) of the Exploiting Reversing Series (ERS), a step-by-step research series on Windows, macOS, hypervisors and browsers, is available for reading on: (PDF): https://exploitreversing.com/wp-content/uploads/2025/03/exploit_reversing_05.pdf I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays SA (@HexRaysSA on X) for their constant and uninterrupted support, which have helped me writeโฆ
Exploiting Reversing (ER) series: article 04 | macOS/iOS (part 01)
The fourth article (126 pages) of the Exploiting Reversing Series (ERS), a step-by-step research series on Windows, macOS, hypervisors and browsers, is available for reading on: (PDF): https://exploitreversing.com/wp-content/uploads/2025/02/exploit_reversing_04.pdf I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays SA (@HexRaysSA on X) for their constant and uninterrupted support, which have helped me writeโฆ
Exploiting Reversing (ER) series: article 03 | Chrome (part 01)
The third article (62 pages) of the Exploiting Reversing Series (ERS), a step-by-step research series on Windows, macOS, hypervisors and browsers, is available for reading on: (PDF): https://exploitreversing.com/wp-content/uploads/2025/01/exploit_reversing_03.pdf I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays SA (@HexRaysSA on X) for their constant and uninterrupted support, which have helped me writeโฆ
Malware Analysis Series (MAS): article 10 | Linux
The tenth article (35 pages) of the Malware Analysis Series (MAS), a step-by-step malware analysis and reverse engineering series, is available for reading on: (PDF): https://exploitreversing.com/wp-content/uploads/2025/01/mas_10.pdf I hope this last article of MAS helps professionals from cybersecurity communities around the world. The series is now complete. Have an excellent and keep reversing! Alexandre Borges (JANUARY/15/2025)
Malware Analysis Series (MAS): article 09 | Shellcode
The nineth article (38 pages) of the Malware Analysis Series (MAS), a step-by-step malware analysis and reverse engineering series, is available for reading on: (PDF): https://exploitreversing.com/wp-content/uploads/2025/01/mas_09-1.pdf I hope this article helps professionals from cybersecurity communities around the world. Have an excellent and keep reversing! Alexandre Borges (JANUARY/08/2025) PS: there is a typo on page 07โฆ
Malware Analysis Series (MAS): article 08 | MacOS/iOS
The eighth article (62 pages) in theย Malware Analysis Series (MAS),ย a step-by-step malware analysis and reverse engineering series, is available for reading on: (PDF):ย https://exploitreversing.com/wp-content/uploads/2024/08/mas_08-1.pdf I hope this article helps professionals from cybersecurity community around the world. Have an excellent and keep reversing! Alexandre Borges (AUGUST/07/2024)
Something went wrong. Please refresh the page and/or try again.
Follow My Blog
Get new content delivered directly to your inbox.