Alexandre Borges

@alexandreborges
58 Followers
7 Following
228 Posts
Vulnerability Researcher | Exploit Developer

Today I am releasing the nineth article in the Exploiting Reversing Series (ERS). In “Exploitation Techniques | CVE-2024-30085 (Part 09)” I provide a 106-page deep dive and a comprehensive roadmap for vulnerability exploitation:

https://exploitreversing.com/2026/04/28/exploiting-reversing-er-series-article-09/

The following articles will continue the miniseries about iOS and Chrome, which are my areas of research.

Enjoy the reading and have an excellent day.

#exploit #exploitdevelopment #windows #exploitation #vulnerability #kernel #heapoverflow

CFPsec is program to list Call For Papers or upcoming Hacking/Security Conferences based on cfptime.org website.

https://github.com/alexandreborges/cfpsec

To install it:

python -m pip install -U cfpsec

#cybersecurity #informationsecurity #conferences

The eighth article of the Exploiting Reversing Series (ERS) is now live. Titled “Exploitation Techniques | CVE-2024-30085 (Part 02)” this 91-page technical guide offers a comprehensive roadmap for vulnerability exploitation:

https://exploitreversing.com/2026/03/31/exploiting-reversing-er-series-article-08/

#exploit #exploitdevelopment #windows #exploitation #vulnerability #minifilterdriver #kernel #heapoverflow #ioring

Before dropping my next article (ERS_08), I’ve updated the ERS 06 article (rev C.1):

https://exploitreversing.com/2026/02/11/exploiting-reversing-er-series-article-06/

This revision features a refined ALPC exploit with a new stage and an extended cleaner stage, ensuring a stable exit and preventing system crashes.

I’ve also fixed several minor issues and uploaded a new video demonstrating the practical execution.

Enjoy the read and have an excellent day!

#vulnerability #exploitation #cybersecurity #windows #exploit

Malwoverview v8.0 (codename: Revolutions) has been released:

https://github.com/alexandreborges/malwoverview

To install its complete version: pip install malwoverview[all]

#threathunting #malware #vulnerability #ai #informationsecurity #cybersecurity #cve

Exploiting Reversing (ER) series: article 07 | Exploitation Techniques | CVE-2024-30085 (part 01)

I am excited to release the seventh article in the Exploiting Reversing Series (ERS). Titled “Exploitation Techniques | CVE-2024-30085 (part 01)” this 119-page technical guide offers a comprehensive roadmap for vulnerability exploitation:

https://exploitreversing.com/2026/03/04/exploiting-reversing-er-series-article-07/

Enjoy your reading and have an excellent day.

#exploit #vulnerability #cve #exploitation #infosec #informationsecurity #windows

I am excited to release the extended version of the sixth article in the Exploiting Reversing Series (ERS). Titled "A Deep Dive Into Exploiting a Minifilter Driver (N-day)" this 293-page deep dive offers a comprehensive roadmap for vulnerability exploitation:

https://exploitreversing.com/2026/02/11/exploiting-reversing-er-series-article-06/

Enjoy your reading and have a great day.

#exploit #cve #nday #cybersecurity #informationsecurity #infosec #vulnerability

The sixth article in the Exploiting Reversing Series (ERS), titled "A Deep Dive Into Exploiting a Minifilter Driver (N-day)", a 251-page article provides a comprehensive look at a past vulnerability in a mini-filter driver:

https://exploitreversing.com/2026/02/11/exploiting-reversing-er-series-article-06/

It guides readers through the entire investigation process—beginning with binary diffing and moving through reverse engineering, deep analysis and proof-of-concept stages into full exploit development.

Have an excellent day!

#exploit #exploitation