top of page
All Posts


Ghosts in the Machine Check: Conjuring Hardware Failures for Privilege Escalation
We’ve all seen it. The sudden freeze. The blue screen of death. The catastrophic system halt. Usually, when a processor encounters a truly unrecoverable hardware error—a bit flip in the L2 cache, a voltage sag, or a literal "CPU on fire" scenario—it triggers whats called a Machine Check Exception (MCE) . The hardware realizes the world no longer makes sense, throws its hands up, and shuts everything down before data corruption can spread. It’s the ultimate fail-safe. But as s
6 days ago3 min read


The Future of Reverse Engineering: Seeing Beyond the Bytes
For years, I've been wrestling with a fundamental problem in reverse engineering: how do we truly understand a massive binary blob? Our...
Jul 15, 20253 min read
The Universal Instruction Stream: Why All Code is (Theoretically) The Same
As programmers, our purpose is to define sequences of instructions. That's our craft, our raison d'être. But what if I told you that, at...
Jul 15, 20254 min read
X86 is Turing-Complete Without Data Fetches: A Deep Dive into Instruction-Only Computation
. We're all familiar with the fundamental assumption of computation: to do anything meaningful, you need to access data. Load, store,...
Jul 15, 20254 min read
Vim as a Turing Machine: A Deep Dive into Pure Command-Line Computation
You know Vim, right? That venerable text editor we all love. But how well do you really know it? Today, I want to pull back the curtain...
Jul 15, 20254 min read


Break Me: The Movfuscator – Turning mov into a Soul-Crushing RE Nightmare
Hello everyone, I want to talk about something that started as a bit of a humorous observation but quickly evolved into a fascinating,...
Jul 11, 20254 min read


REpsych: Playing Mind Games with Reverse Engineers
Hey everyone I'm excited to share some of the unconventional ideas I presented at DEF CON 23 regarding "Repsych: Psychological Warfare in...
Jul 11, 20253 min read


Unlocked: The "God Mode" Hardware Backdoor in x86 CPUs – A Deep Dive into Project Rosenbridge
This groundbreaking research exposes a sophisticated hardware backdoor in certain VIA C3 family processors. This backdoor, enabling a devastating ring 3 (userland) to ring 0 (kernel) privilege escalation, represents a fundamental bypass of decades of established hardware and software security paradigms.
Jul 11, 20254 min read


Shedding Light on the x86 Black Box: Uncovering Secrets and Bugs with Sandsifter
For too long, we've treated our computer processors as infallible "black boxes," blindly trusting them to execute our code without...
Jul 11, 20254 min read


The Memory Sinkhole: Unearthing a 20-Year-Old x86 Design Flaw for Universal Privilege Escalation
A significant architectural vulnerability, dubbed "The Memory Sinkhole," has been uncovered in the x86 architecture, a flaw that has...
Jul 11, 20253 min read
bottom of page
