<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://s4dbrd.github.io/</id><title>Adrian's Security Research</title><subtitle>Kernel vulnerability research and exploit development.</subtitle> <updated>2026-03-29T17:41:28+02:00</updated> <author> <name>s4dbrd</name> <uri>https://s4dbrd.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://s4dbrd.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://s4dbrd.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 s4dbrd </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>CVE-2026-20811: Win32k Type Confusion in Cloud-Deployed Feature Flag</title><link href="https://s4dbrd.github.io/posts/win32k-type-confusion-async-window-action-cmonitor/" rel="alternate" type="text/html" title="CVE-2026-20811: Win32k Type Confusion in Cloud-Deployed Feature Flag" /><published>2026-03-29T00:00:00+01:00</published> <updated>2026-03-29T00:00:00+01:00</updated> <id>https://s4dbrd.github.io/posts/win32k-type-confusion-async-window-action-cmonitor/</id> <content type="text/html" src="https://s4dbrd.github.io/posts/win32k-type-confusion-async-window-action-cmonitor/" /> <author> <name>s4dbrd</name> </author> <category term="Vulnerability Research" /> <category term="Windows Internals" /> <summary>CVE-2026-20811 is a type confusion in win32kfull.sys (KB5074109, CVSS 7.8). The bug is in the async window action processing path introduced by a feature flag rollout (Feature_ApplyWindowActionConvergence), where a kernel pointer to a CMonitorTopology object survives incomplete sanitization of a cross-thread message buffer and is dereferenced in the receiving thread’s context. Note: despite bei...</summary> </entry> <entry><title>Reversing BEDaisy.sys: Static Analysis of BattlEye's Kernel Anti-Cheat Driver</title><link href="https://s4dbrd.github.io/posts/reversing-bedaisy/" rel="alternate" type="text/html" title="Reversing BEDaisy.sys: Static Analysis of BattlEye&amp;apos;s Kernel Anti-Cheat Driver" /><published>2026-03-06T00:00:00+01:00</published> <updated>2026-03-28T23:50:25+01:00</updated> <id>https://s4dbrd.github.io/posts/reversing-bedaisy/</id> <content type="text/html" src="https://s4dbrd.github.io/posts/reversing-bedaisy/" /> <author> <name>s4dbrd</name> </author> <category term="Anti-Cheat" /> <category term="Reverse Engineering" /> <summary>In the first post I covered how kernel anti-cheat systems work at an architectural level: the callbacks they register, the memory scanning they perform, the detection techniques they use. All of that was theoretical, with small proof-of-concept drivers and WinDbg demos to illustrate each concept. This post is the practical follow-up. I wanted to take one real, production anti-cheat driver and s...</summary> </entry> <entry><title>How Kernel Anti-Cheats Work: A Deep Dive into Modern Game Protection</title><link href="https://s4dbrd.github.io/posts/how-kernel-anti-cheats-work/" rel="alternate" type="text/html" title="How Kernel Anti-Cheats Work: A Deep Dive into Modern Game Protection" /><published>2026-02-23T00:00:00+01:00</published> <updated>2026-02-23T00:00:00+01:00</updated> <id>https://s4dbrd.github.io/posts/how-kernel-anti-cheats-work/</id> <content type="text/html" src="https://s4dbrd.github.io/posts/how-kernel-anti-cheats-work/" /> <author> <name>s4dbrd</name> </author> <category term="Anti-Cheat" /> <category term="Windows Internals" /> <summary>Modern kernel anti-cheat systems are, without exaggeration, among the most sophisticated pieces of software running on consumer Windows machines. They operate at the highest privilege level available to software, they intercept kernel callbacks that were designed for legitimate security products, they scan memory structures that most programmers never touch in their entire careers, and they do ...</summary> </entry> </feed>
