I am excited to release the extended version of the sixth article in the Exploiting Reversing Series (ERS). Titled "A Deep Dive Into Exploiting a Minifilter Driver (N-day)" this 293-page deep dive offers a comprehensive roadmap for vulnerability exploitation:

https://exploitreversing.com/2026/02/11/exploiting-reversing-er-series-article-06/

Key updates in this extended edition:

[+] Dual Exploit Strategies: Two distinct exploit versions.
[+] Exploit ALPC Write Primitive Edition: elevation of privilege of a regular user to SYSTEM.
[+] Exploit Parent Process ID Spoofing Edition: elevation of privilege of an administrator to SYSTEM.
[+] Solid Reliability: A completely stable and working ALPC write primitive.
[+] Optimized Exploit Logic: Significant refinements to the codebase and technical execution for better stability and predictability.

For those who have read the original release, whose exploit was working, my strong recommendation is that you adopt this extended edition as definitive.

The article guides you through the entire lifecycle of an exploit: from initial reverse engineering and vulnerability analysis to multiple PoC developments and full exploitation.

I hope this serves as a definitive resource for your research. If you find it helpful, please feel free to share it or reach out with your feedback!

Enjoy your reading and have a great day.

#exploit #cve #nday #cybersecurity #informationsecurity #infosec #vulnerability

I am excited to release the extended version of the sixth article in the Exploiting Reversing Series (ERS). Titled "A Deep Dive Into Exploiting a Minifilter Driver (N-day)" this 293-page deep dive offers a comprehensive roadmap for vulnerability exploitation:

https://exploitreversing.com/2026/02/11/exploiting-reversing-er-series-article-06/

Enjoy your reading and have a great day.

#exploit #cve #nday #cybersecurity #informationsecurity #infosec #vulnerability

I am pleased to announce the publication of the sixth article in the Exploiting Reversing Series (ERS). Titled "A Deep Dive Into Exploiting a Minifilter Driver (N-day)", this 251-page article provides a comprehensive look at a past vulnerability in a mini-filter driver:

https://exploitreversing.com/2026/02/11/exploiting-reversing-er-series-article-06/

It guides readers through the entire investigation process—beginning with binary diffing and moving through reverse engineering, deep analysis and proof-of-concept stages into full exploit development.

I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays SA (@HexRaysSA on X) for their constant and uninterrupted support, which has helped me write these articles over time. 

I hope this serves as a valuable resource for your research. If you enjoy the content, please feel free to share it or reach out with feedback.

Have an excellent day!

#exploit #exploitation #vulnerability #nday #reverseengineering #windows

📢 Découverte d'une variante de vulnérabilité Nday sur le Zyxel NWA50AX Pro
📝 Dans un article publié sur le Frycos Security Diary, un analyste en cybersécurité partage sa découverte d'une **variante de vulnérabilité Nday** sur le **Zyxel NWA5...
📖 cyberveille : https://cyberveille.ch/posts/2025-06-18-decouverte-d-une-variante-de-vulnerabilite-nday-sur-le-zyxel-nwa50ax-pro/
🌐 source : https://frycos.github.io/vulns4free/2025/06/17/zyxel-nday-variant.html
#Nday #TTP #Cyberveille
Découverte d'une variante de vulnérabilité Nday sur le Zyxel NWA50AX Pro

Dans un article publié sur le Frycos Security Diary, un analyste en cybersécurité partage sa découverte d’une variante de vulnérabilité Nday sur le Zyxel NWA50AX Pro, un point d’accès WiFi 6 destiné aux petites entreprises. L’analyste, en vacances, a exploré le firmware de l’appareil et a découvert une configuration du serveur lighttpd permettant l’accès non authentifié à certains endpoints CGI. En analysant les fichiers de configuration et en testant les réponses HTTP, il a pu accéder à des fichiers CGI sans authentification, révélant une potentielle faille de sécurité.

CyberVeille
How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends | Google Cloud Blog

Mandiant analyzed 138 vulnerabilities that were disclosed in 2023 and that we tracked as exploited in the wild.

Google Cloud Blog
How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends | Google Cloud Blog

Mandiant analyzed 138 vulnerabilities that were disclosed in 2023 and that we tracked as exploited in the wild.

Google Cloud Blog

This Week in Security: Find My Keylogger, Zephyr, and Active Exploitation

#hackadaycolumns #news #securityhacks #airtags #findmy #looneytoonables #nday #hackaday

-- Delivered by RssEverything service

hackaday.com/2023/11/10/this-w…

This Week In Security: Find My Keylogger, Zephyr, And Active Exploitation

Keyloggers. Such a simple concept — you secretly record all the characters typed on a keyboard, and sort through it later for interesting data. That keyboard sniffer could be done in software…

Hackaday
Join suidpid 🩺 in his journey into executing arbitrary code in #healthcare 🏥 servers with #polyglot files by creating an #exploit for CVE-2023-33466! #nday #exploit
https://www.shielder.com/blog/2023/10/cve-2023-33466-exploiting-healthcare-servers-with-polyglot-files/
Shielder - CVE-2023-33466 - Exploiting Healthcare Servers with Polyglot Files

A recently disclosed CVE for the Orthanc DICOM server can be used to obtain Remote Code Execution. As a PoC was not available, we wrote one.

Shielder

Very well written #Windows #patchdiffing and #nday #exploitation walkthrough ✊

Dissecting and Exploiting TCP/IP RCE #Vulnerability EvilESP (CVE-2022-34718)

// by @chompie1337

https://securityintelligence.com/posts/dissecting-exploiting-tcp-ip-rce-vulnerability-evilesp/

Dissecting and Exploiting TCP/IP RCE Vulnerability “EvilESP”

See how one IBM X-Force researcher reverse engineered the patch for CVE-2022-34718, and unpack the affected protocols, how the bug was identified, and how it was reproduced.

Security Intelligence
Slashdot