Xyrem Engineering
  • Menu ▾
    • About Me
  • About Me

Exploiting Windows’ vulnerabilities with Hyper-V: A Hacker’s swiss army knife

Xyrem
#Windows  #HyperV  #HyperDeceit  #Hypercall  #Reverse Engineering 
In this blog, we explore how to leverage the implementation of the Hyper-V virtualization technology to exploit and attack Windows systems and learn what measures should be taken to mitigate this vulnerability. Join us as we explore the world of Windows hacking with Hyper-V.
Read more →

In-depth analysis on Valorant’s Guarded Regions

Xyrem
#Valorant  #Vanguard  #vgk  #Guarded Regions  #Shadow Regions  #Reverse Engineering 
In this post, we will analyze how Vanguard attempts to keep away bad actors by utilizing a simple yet brutally strong method
Read more →
© 2023 Xyrem :: Theme made by panr