Reading view
In-depth analysis on Valorant's Guarded Regions
Disclaimer This post is not meant to be an attack towards Riot Gamesβ Vanguard or Microsoftβs Windows, they have done an excellent job with their products and will continue to do so for the coming years, the content of this post is gathered solely by me, and I am not tied to any game hack publisher or entities. I have no intention of harming any companyβs product, and everything here is constructed for educational purposes.
Exploiting Windows' vulnerabilities with Hyper-V: A Hacker's swiss army knife
Disclaimer I constructed this post entirely for educational purposes only, and this blog post is limited in depth with respect to Hyper-V internals.
Introduction Hyper-V is Microsoftβs virtualization technology for Windows operating systems, providing a virtualization layer that allows multiple virtual machines to run on a single physical machine. While it provides a secure and isolated environment for running virtual machines, the Windows implementation of Hyper-V also presents a significant attack vector that is not entirely well-known to many security professionals and is compliant with security technologies deployed by Windows, such as KPP (PatchGuard) and VBS (Virtualization Based Security) if loaded before they are fully initialized.
About me
Hi there! Iβm Aryan. I am a hobbyist programmer and reverse engineer, I use low-level languages like C, and assembly as an extension for myself to find and abuse vulnerabilities, I mostly reverse and create anti-cheat products as a way to gain more knowledge. I have created this blog as a means to communicate my research and knowledge to the world.
Contacts Email: [email protected]
Github: https://github.com/Xyrem
Twitter: @Xyrem256
Virtual Trails: Unmasking commercial virtualization softwares through virtualization faults.
Disclaimer This post is entirely constructed for educational purposes only.
Introduction In this era of software development, protecting your code from being analyzed is a huge matter where many software developers decide to use many techniques to thwart an analyzerβs efforts towards analyzing a said program. Many developers reside to use commercial code protection softwares such as VMProtect / Themida