
The Neodyme Blog


The Key to COMpromise - Downloading a SYSTEM shell, Part 3

Introducing HyperHook: A harnessing framework for Nyx

The Key to COMpromise - Abusing a TOCTOU race to gain SYSTEM, Part 2

Windows BitLocker -- Screwed without a Screwdriver

On Secure Boot, TPMs, SBAT, and downgrades -- Why Microsoft hasn't fixed BitLocker yet

The Key to COMpromise - Pwning AVs and EDRs by Hijacking COM Interfaces, Part 1

Solana Consensus - From Forks to Finality

From Guardian to Gateway: The Hidden Risks of EDR Vulnerabilities

RCE on the HP M479fdw printer

SPL Token-2022: Don't shoot yourself in the foot with extensions

Riverguard: How to Get Access to Findings for Your Contract

Riverguard: Fishing for Loss of Funds in the Stream of Solana Transactions

Hidden GitHub Commits and How to Reveal Them

How to Hack a DAO

CS:GO: From Zero to 0-day

Nonce Upon a Time, or a Total Loss of Funds - Exploring Solana Core Part 3

Secure Randomness: From Zero to Verifiable Delay Functions, Part 2

Stake², or How To Cheat The Staking Mechanism - Exploring Solana Core Part 2
