
Alex Ionescu
@aionescu
Chief Technical Innovation Officer @crowdstrike. Windows Internals author and trainer. He/Him. RTs are not endorsements, opinions are my own.
ID: 14429550
http://www.windows-internals.com 18-04-2008 04:04:33
8,8K Tweet
47,47K Followers
2,2K Following

Wanted to share a technical blog post that I coauthored on some of the architectural decisions that I helped drive during my time as Chief Architect CrowdStrike all those years ago. Thank you to the team and David Weston (DWIZZZLE) for the partnership. crowdstrike.com/blog/tech-anal…



We are excited to welcome Yarden Shafir (Yarden Shafir ) to the team!!!

It’s wonderful to see what Xeno Kovah and his collaborators have built for the community. I always recommend OST2 for my new hires and other juniors, or just anyone trying to get started on a new topic. The courses are excellent. It’s an honor to sponsor the Windows Security Path




I created a hypervisor-based emulator for Windows x64 binaries. This project uses Windows Hypervisor Platform to build a virtualized user-mode environment, allowing syscalls and memory accesses to be logged or intercepted. elastic.co/security-labs/… Project: github.com/x86matthew/Win…


Today I’m sharing a blog post on the implementation of kernel mode shadow stacks on Windows! This post covers actively debugging the Secure Kernel and also outlines why VTL 1 is relied on to help maintain the integrity of the supervisor shadow stacks! connormcgarr.github.io/km-shadow-stac…

Come learn Windows Internal with Yarden Shafir at Recon Montreal on June 23-26 #reverseengineering #cybersecurity recon.cx/2025/trainingW…

Day 1 of Windows OS Internals for Security Professionals ✅ with Yarden Shafir and Connor McGarr. Tremendous course. Been wanting to take it for years. On to day 2!!!!

I’m not saying you definitely have to go to BlueHat IL this year, I’m just letting you know it’s free, by the beach and I’ll be there dropping kernel pointers to anyone who asks nicely




Vulnerability Researcher Yarden Shafir takes the BlueHatIL stage to explore surprising ways kernel pointers can still be accessed, even with modern security measures in place. From ASLR to event logs, she dives into the creative techniques researchers use to uncover new attack



