
The Neodyme Blog


Pwn2Own Ireland 2024: Canon imageCLASS MF656Cdw

HTML to PDF Renderer: A tale of local file access and shellcode execution

The Key to COMpromise - Writing to the Registry (again), Part 4

The Key to COMpromise - Downloading a SYSTEM shell, Part 3

Introducing HyperHook: A harnessing framework for Nyx

The Key to COMpromise - Abusing a TOCTOU race to gain SYSTEM, Part 2

Windows BitLocker -- Screwed without a Screwdriver

On Secure Boot, TPMs, SBAT, and downgrades -- Why Microsoft hasn't fixed BitLocker yet

The Key to COMpromise - Pwning AVs and EDRs by Hijacking COM Interfaces, Part 1

Solana Consensus - From Forks to Finality

From Guardian to Gateway: The Hidden Risks of EDR Vulnerabilities

RCE on the HP M479fdw printer

SPL Token-2022: Don't shoot yourself in the foot with extensions

Riverguard: How to Get Access to Findings for Your Contract

Riverguard: Fishing for Loss of Funds in the Stream of Solana Transactions

Hidden GitHub Commits and How to Reveal Them

How to Hack a DAO

CS:GO: From Zero to 0-day
