Tagged articles
6 articles
Page 1 of 1
Black & White Path
Black & White Path
May 19, 2026 · Information Security

Is BitLocker Hiding a Deliberate Backdoor? Inside the YellowKey Bypass Attack

A security researcher released the YellowKey proof‑of‑concept showing that, on Windows 11 and Server 2022/2025, BitLocker can be bypassed without a password or recovery key by using a crafted USB and multiple reboots, sparking accusations that Microsoft may have embedded a backdoor in the WinRE component.

BitLockerTPMTransactional NTFS
0 likes · 13 min read
Is BitLocker Hiding a Deliberate Backdoor? Inside the YellowKey Bypass Attack
Geek Labs
Geek Labs
May 17, 2026 · Industry Insights

Four Must‑Watch GitHub Projects: Bitlocker Exploit, ESP32 Dashboard, AI‑Powered 3D Generation, and A‑Share Data Toolkit

This article highlights four recent GitHub projects—YellowKey exposing a Windows 11 Bitlocker bypass, Clawdmeter delivering an ESP32‑S3 desktop dashboard for Claude Code usage, Pixal3D enabling single‑image 3D asset creation, and a‑stock‑data providing a comprehensive AI‑driven A‑share data toolkit—detailing their core mechanisms, hardware/software specs, and quick‑start instructions.

AI 3D generationA‑share dataBitLocker
0 likes · 12 min read
Four Must‑Watch GitHub Projects: Bitlocker Exploit, ESP32 Dashboard, AI‑Powered 3D Generation, and A‑Share Data Toolkit
Beike Product & Technology
Beike Product & Technology
Aug 15, 2018 · Information Security

Malware Incident Response: Analyzing and Removing a Persistent Windows Trojan

This article details a step‑by‑step incident‑response case study of a Windows internal‑network Trojan that exploited SMB port 445, describing how alerts were identified, malicious processes were traced, terminated, and fully removed using tools such as netstat, PChunter, and process monitoring utilities.

Network ScanningWindows securityincident response
0 likes · 6 min read
Malware Incident Response: Analyzing and Removing a Persistent Windows Trojan
ITPUB
ITPUB
May 16, 2018 · Information Security

Unveiling Ctrl‑Inject: A Stealthy Console‑Based Process Injection Technique

This article explains the novel Ctrl‑Inject method that leverages the console Ctrl‑signal handling mechanism to inject code into Windows console processes, detailing its inner workings, pointer‑encoding and CFG bypasses, and the steps required to trigger and clean up the injection.

CFG bypassCtrl-InjectWindows security
0 likes · 10 min read
Unveiling Ctrl‑Inject: A Stealthy Console‑Based Process Injection Technique
UCloud Tech
UCloud Tech
Jun 28, 2017 · Information Security

How the Petya Ransomware Exploits CVE-2017-0199 and MS17-010 – Prevention Tips

The Petya ransomware, spreading across Europe and affecting over 80 companies in Russia and Ukraine, leverages the CVE‑2017‑0199 RTF vulnerability for phishing and the MS17‑010 SMB flaw for internal propagation, encrypts the MFT to render systems unbootable, and can be mitigated by applying Windows patches, using strong passwords, and backing up data.

CVE-2017-0199MS17-010Petya
0 likes · 2 min read
How the Petya Ransomware Exploits CVE-2017-0199 and MS17-010 – Prevention Tips