top of page
All Posts


The Future of Reverse Engineering: Seeing Beyond the Bytes
For years, I've been wrestling with a fundamental problem in reverse engineering: how do we truly understand a massive binary blob? Our...
Jul 153 min read
The Universal Instruction Stream: Why All Code is (Theoretically) The Same
As programmers, our purpose is to define sequences of instructions. That's our craft, our raison d'être. But what if I told you that, at...
Jul 154 min read
X86 is Turing-Complete Without Data Fetches: A Deep Dive into Instruction-Only Computation
. We're all familiar with the fundamental assumption of computation: to do anything meaningful, you need to access data. Load, store,...
Jul 154 min read
Vim as a Turing Machine: A Deep Dive into Pure Command-Line Computation
You know Vim, right? That venerable text editor we all love. But how well do you really  know it? Today, I want to pull back the curtain...
Jul 154 min read


Break Me: The Movfuscator – Turning mov into a Soul-Crushing RE Nightmare
Hello everyone, I want to talk about something that started as a bit of a humorous observation but quickly evolved into a fascinating,...
Jul 114 min read


REpsych: Playing Mind Games with Reverse Engineers
Hey everyone I'm excited to share some of the unconventional ideas I presented at DEF CON 23 regarding "Repsych: Psychological Warfare in...
Jul 113 min read


Unlocked: The "God Mode" Hardware Backdoor in x86 CPUs – A Deep Dive into Project Rosenbridge
This groundbreaking research exposes a sophisticated hardware backdoor in certain VIA C3 family processors. This backdoor, enabling a devastating ring 3 (userland) to ring 0 (kernel) privilege escalation, represents a fundamental bypass of decades of established hardware and software security paradigms.
Jul 114 min read


Shedding Light on the x86 Black Box: Uncovering Secrets and Bugs with Sandsifter
For too long, we've treated our computer processors as infallible "black boxes," blindly trusting them to execute our code without...
Jul 114 min read


The Memory Sinkhole: Unearthing a 20-Year-Old x86 Design Flaw for Universal Privilege Escalation
A significant architectural vulnerability, dubbed "The Memory Sinkhole," has been uncovered in the x86 architecture, a flaw that has...
Jul 113 min read
bottom of page