Skip to content
Bill's Blog
Home
About
Security Research
Category
Published on
17 December 2020
Insecure by Design, Epic Games Peer-to-Peer Multiplayer Service
Published on
16 September 2020
Defeating Macro Document Static Analysis with Pictures of My Cat
Published on
18 May 2020
How to use Trend Micro’s Rootkit Remover to Install a Rootkit
Published on
3 April 2020
Several Critical Vulnerabilities on most HP machines running Windows
Published on
2 December 2019
Insecure by Design, Weaponizing Windows against User-Mode Anti-Cheats
Published on
19 July 2019
Local Privilege Escalation on Dell machines running Windows
Published on
30 April 2019
Remote Code Execution on most Dell computers
Published on
13 April 2019
Hacking College Admissions
Published on
12 April 2019
Reversing the CyberPatriot National Competition Scoring Engine
Published on
14 February 2019
Reading Physical Memory using Carbon Black’s Endpoint driver