Forensics on Network AppliancesThe nightmare of network appliance forensics, ft. Pulse SecureSep 2, 2025·14 min read
Peeking Inside Apple's Private Cloud ComputeAn unprecedented look into Apple Intelligence's internal server tools and security featuresNov 14, 2024·28 min read
Mitigating DMA Attacks Through Redirected Address TablesMy thunderbolt dock should be innocent until proven guiltyNov 13, 2024·20 min read
Smuggling Malware Using HoYoverse GamesThe leading provider of Bring-Your-Own-Vulnerable-Gacha-Games (BYOVGG)Sep 26, 2024·24 min read
The Basics of Intel VT-x ExtensionsI tortured myself for a month understanding the Intel Architecture Software Development ManualAug 27, 2024·29 min read
Understanding Kernel-Level Anticheats in Online GamesSeeing Behind the Grey-ish Tactics of AnticheatsJul 21, 2024·48 min read
Quick Analysis About the Crowdstrike Situationitoldyouso.jpg about kernel-mode drivers, duhJul 21, 2024·9 min read