Alexandre Borges

Vulnerability Researcher | Exploit Developer | Reverse Engineer (speaker 3x at DEF CON).

2025-05-04

@ljs

Lorenzo, your book is excellent, and certainly one of best books (by far) that I've read in the last years.It is really an outstanding work.

2025-04-27
2025-04-20

Technical analysis of CVE-2025-31201: reverse engineering the diff between iOS 18.4 and 18.4.1 to study the changes made to RPAC.:

blog.epsilon-sec.com/cve-2025-

#iOS #apple #cybersecurity #reversing #pac #security #cve #vulnerability

2025-04-17
2025-04-14

@kedislav Ked, I think it is possible with eventual changes or even small new procedures, but it certainly takes time. Anyway, the procedure is interesting, isn't it? Have an excellent

2025-04-01

Version 1.4 of CFPsec, a simple client that lists call for papers and upcoming Hacking/Security Conferences from the command line, has been released:

github.com/alexandreborges/cfp

To install it: pip install -U cfpsec

Finally, this trivial project has been updated.

#hacking #cybersecurity #conferences #infosec

CFPsec: a simple client that lists call for papers and upcoming Hacking/Security Conferences from the command line.
2025-03-26

Even though I've been away from the field for years, it's great to see that a simple tool that I initially launched in 2018 and with great collaborators (Artur Marzano, Corey Forman and Christian Clauss) has been used by so many professionals.

helpnetsecurity.com/2025/03/26

#malware

Malwoverview
2025-03-18

@claushoumann Claus, your suggestion is great and yes, I do know OST and the work done by them is excellent. However, I don't consider migrate to there for multiple reasons. First of all, I've already written over 1.000 pages, which is too much and I prefer to keep writing to my own blog, which is my free space to help other professionals.. There are other points that are related to my work. For example, I have been teaching (and writing) different courses for Blackstorm Security since 2017 (private classes), and I don't have authorization to "author courses for any other place". Eventually, I could teach classes in conferences, but I have never had enough time to do it (I hope doing it this year or the next one). I've been away from conferences since 2020 (SANS) and dedicated to vulnerability research and mainly exploit development, but presenting about these topics is complicated because they are "sensitive". Therefore, the blog is still a way to balancing between my work and helping people without suffering extra pressure. By the way, Luxembourg is an amazing place to discuss about information security (I have a few friends living there), and someday I want to visit the city to speak in local conferences and interact with professionals. Thank your for your kind message, Claus. Have an excellent day.

2025-03-18

To date, I have published 15 articles (1045 pages) with the strict goal of helping the cybersecurity community.

ERS (439 pages, so far):

[+] ERS 05: exploitreversing.com/2025/03/1
[+] ERS 04: exploitreversing.com/2025/02/0
[+] ERS 03: exploitreversing.com/2025/01/2
[+] ERS 02: exploitreversing.com/2024/01/0
[+] ERS 01: exploitreversing.com/2023/04/1

MAS (606 pages -- finished):

[+] MAS 10: exploitreversing.com/2025/01/1
[+] MAS 09: exploitreversing.com/2025/01/0
[+] MAS 09: exploitreversing.com/2024/08/0
[+] MAS 07: exploitreversing.com/2023/01/0
[+] MAS 06: exploitreversing.com/2022/11/2
[+] MAS 05: exploitreversing.com/2022/09/1
[+] MAS 04: exploitreversing.com/2022/05/1
[+] MAS 03: exploitreversing.com/2022/05/0
[+] MAS 02: exploitreversing.com/2022/02/0
[+] MAS 01: exploitreversing.com/2021/12/0

The blog home page is: exploitreversing.com/

I will be back in a few months with the next articles in the Exploiting Reversing series, which will focus on vulnerability and exploitation, once I have laid all the necessary groundwork. I'm currently taking a break from writing to focus on research.

Enjoy reading and have an excellent day.

#windows #iOS #macOS #cybersecurity #infosec #chrome #kernel #malware #reverseengineering #vulnerability #research #hypervisor

Exploiting Reversing Series (ERS) and Malware Analysis Series (MAS)
2025-03-12

The fifth article (57 pages) of the Exploiting Reversing Series (ERS) is available on:

exploitreversing.com/2025/03/1

I would like to thank Ilfak Guilfanov @ilfak and Hex-Rays SA @HexRaysSA for their constant and uninterrupted support, which have helped me write these articles.

I hope you enjoy reading it and have an excellent day.

#hypervisor #hyperv #architecture #cybersecurity #research #internals #idapro #informationsecurity #microsoft

Exploiting Reversing (ER) series: article 05 | Hyper-V (part 01)
2025-03-04

Hacking the Xbox 360 Hypervisor:

01. Hacking the Xbox 360 Hypervisor Part 1: System Overview: icode4.coffee/?p=1047

02. Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit: icode4.coffee/?p=1081

#hacking #exploit #exploitation #xbox #reversing #informationsecurity #hardware #cybersecurity #hypervisor

Hacking XBOX Hypervisor

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst