Alexandre Borges
banner
alexandreborges.bsky.social
Alexandre Borges
@alexandreborges.bsky.social
Vulnerability Researcher | Exploit Developer (speaker 3x at DEF CON)
Pinned
So far, I have already written 15 articles (1045 pages), which have been published on my blog:

blog: exploitreversing.com

Series:

[+] ERS: Exploiting Reversing Series
[+] MAS: Malware Analysis Series

Enjoy reading and have a great day.

#windows #iOS #macOS #chrome #kernel #vulnerability
From Coverage to Causes: Data-Centric Fuzzing for JavaScript Engines:

(paper) arxiv.org/pdf/2512.18102
(project) github.com/KKGanguly/Da...

#fuzzing #vulnerability #javascript #exploitation #llm
December 27, 2025 at 1:07 AM
Callback hell: abusing callbacks, tail-calls, and proxy frames to obfuscate the stack:

klezvirus.github.io/posts/Callba...

#cybersecurity #infosec #windows #reverseengineering #programming
December 23, 2025 at 5:26 PM
December 21, 2025 at 2:05 PM
December 17, 2025 at 2:03 PM
December 13, 2025 at 1:07 PM
No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE;

modzero.com/en/blog/no-l...

#exploitation #cve #rce #rop #aslr #arm #iot
No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE
modzero.com
December 11, 2025 at 12:50 AM
This is a really interesting project: it allows you to track all Windows releases/updates, KBs, interact with the file systems associated with them, and even download files.:

oswatcher.github.io/frontend/

#windows #kb #updates #security #research
December 7, 2025 at 1:33 PM
Reposted by Alexandre Borges
This vulnerability was the inspiration for the first step of the Panel challenge we played during last week’s Grehack CTF

But we found a dumb bypass 😎
December 3, 2025 at 2:42 PM
December 2, 2025 at 4:52 PM
November 19, 2025 at 1:26 AM
Introducing HCLI: The Modern Command-Line Interface for IDA:

hex-rays.com/blog/introdu...

#idapro #interface #ida #hcli #reverseengineering
November 17, 2025 at 11:39 PM
November 17, 2025 at 11:35 PM
November 14, 2025 at 5:24 PM