I am pleased to announce the publication of the sixth article in the Exploiting Reversing Series (ERS). Titled “A Deep Dive Into Exploiting a Minifilter Driver (N-day)”, this 251-page article provides a comprehensive look at a past vulnerability in a mini-filter driver:
https://exploitreversing.com/wp-content/uploads/2026/02/exploit_reversing_06.pdf
It guides readers through the entire investigation process—beginning with binary diffing and moving through reverse engineering, deep analysis and proof-of-concept stages into full exploit development.
I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays SA (@HexRaysSA on X) for their constant and uninterrupted support, which has helped me write these articles over time.
I hope this serves as a valuable resource for your research. If you enjoy the content, please feel free to share it or reach out with feedback.
Have an excellent day!
Alexandre Borges
(FEBRUARY/11/2026)
PS: The videos demonstrating the exploit are below: