- mov eax, [ebp+location]
- idov31.github.io
- @Idov31
- @idov31@infosec.exchange
- https://linktr.ee/idov31
👨🏻💻 About me:
I am an experienced security researcher who has worked in various cybersecurity roles. My main interests are OS internals, reverse engineering, kernel development and exploit development. In my free time, I am working on projects regarding evasion, persistence, and injection methods for UEFI, kernel, and user mode. Based on these, I publish educational papers and presents talks to give back to the cybersecurity community.
📧 Feel free to contact me viaTwitter,Telegram ormail regarding any of my projects or publications.
💭 Currently working on:
New projects
New papers
New talks
🌐 My blog posts:
🗣️ Talks:
- Kernel Games: The Ballad of Offense & Defense - X33fCon 2024
- (Lady|)Lord Of The Ring0 - BSidesTLV 2023
PinnedLoading
- FunctionStomping
FunctionStomping PublicShellcode injection technique. Given as C++ header, standalone Rust program or library.
- Jormungandr
Jormungandr PublicJormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.
If the problem persists, check theGitHub status page orcontact support.