A screenshot of DiaSymbolView inspecting combase.pdb
I wanted to understand what information is available in .pdb files, so I made a tool for it ππ
Welcome DiaSymbolView - a debug symbol hierarchy and properties viewer based on MSDIA: github.com/diversenok/D...
10.11.2025 21:04 β π 10 π 4 π¬ 1 π 0
Attacking Assumptions Behind the Image Load Callback :: RomHack 2025
Here are my RomHack slides about low-privileged attack vectors against PsSetLoadImageNotifyRoutine and drivers that rely on it. Enjoy!
diversenok.github.io/slides/RomHa...
29.09.2025 23:29 β π 2 π 1 π¬ 0 π 0
Improving AFD Socket Visibility for Windows Forensics & Troubleshooting
This blog post explains the basics of Ancillary Function Driver API and how it can help explore networking activity on Windows systems.
My new blog post π₯³
Improving AFD Socket Visibility for Windows Forensics & Troubleshooting
It discusses the low-level API under Winsock (IOCTLs on \Device\Afd handles) and explores the workings of the new socket inspection feature in System Informer π₯
www.huntandhackett.com/blog/improvi...
15.05.2025 09:38 β π 2 π 1 π¬ 0 π 0
I think the list of unloaded modules (aka. RtlGetUnloadEventTraceEx) is underappreciated. Ntdll records metadata about DLLs that unloaded from the process and even includes modules that attempted to load but failed their DllMain.
learn.microsoft.com/en-us/window...
18.04.2025 18:34 β π 1 π 0 π¬ 0 π 0
The feature is live in the latest Canary builds and displays even more properties than initially planned π
Also, a blog post that explains the basics of AFD API and its forensic potential is coming soon.π
07.04.2025 12:29 β π 1 π 0 π¬ 0 π 0
Better socket handle visibility coming soon to System Informer! π₯
When viewing a process handle table, SI will recognize files under \Device\Afd and retrieve information about their state, protocol, addresses, and more. Also works on Bluetooth and Hyper-V sockets π€©
25.03.2025 13:30 β π 1 π 0 π¬ 0 π 1
Red Brain, Blue Fingers
Malware Analysis, Reverse Engineering, Threat Hunting, Detection Engineering, DFIR, Security Research, Programming, Curiosities, Software Archaeology, Puzzles, Bad dad jokes
https://www.hexacorn.com/blog/
hexacorn@infosec.exchange
A circus artist with a visual studio license
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker.
Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.
Pentest & Windows security research
and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
WinDbgβer @ Elastic Security.
Thoughts are my own.
Some of my writing: http://tiny.cc/jqeavz
More writing: http://tiny.cc/9cj0vz
Also: https://twitter.com/GabrielLandau
offensive security - windows internals - reverse engineering | X: https://x.com/splinter_code | Mastodon: https://infosec.exchange/@splinter_code | GitHub: https://github.com/antonioCoco | Blog: https://splintercod3.blogspot.com/
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Posts are my own etc.