XENOPS
Blog Tags
XENOPS Research

Security research shaped like field notes, not marketing.

Reverse engineering, detection logic, incident tradeoffs, and the operational details that usually get cut from the final report.

Latest Research
View all
Breaking the Cube
Mar 06, 2026
XENOPS Research

Breaking the Cube

Reverse engineering ionCube's Zend VM hooks and the opcode dispatch it drives.

  • Reverse Engineering
  • PHP
  • ionCube
AngstromCTF 2024: XS-Leak via :visited
Feb 17, 2026
ixSly

AngstromCTF 2024: XS-Leak via :visited

Imported writeup on a :visited-based XS-Leak oracle from AngstromCTF 2024.

  • CTF
  • XS-Leak
Test Post: Visuals, Code, and Callouts
Feb 17, 2026
XENOPS Research

Test Post: Visuals, Code, and Callouts

A visual smoke test covering images, code blocks, and callout styling.

  • Test
  • Layout
  • MDX
Detecting Low-and-Slow Beaconing in Endpoint Telemetry
Dec 06, 2025
XENOPS Research

Detecting Low-and-Slow Beaconing in Endpoint Telemetry

A repeatable method for surfacing beacon patterns that evade simple interval checks.

  • Detection
  • Telemetry
  • Endpoint
SSL MITM Behavior in Embedded Management Firmware
Nov 18, 2025
XENOPS Research

SSL MITM Behavior in Embedded Management Firmware

Mapping certificate validation gaps across common out-of-band management stacks.

  • Reverse Engineering
  • Firmware
  • TLS
Credential Rotation Under Active Intrusion
Oct 02, 2025
XENOPS Research

Credential Rotation Under Active Intrusion

A staged rotation plan that avoids service collapse while removing attacker persistence.

  • Incident Response
  • Identity
  • Operations
XENOPS © 2026 XENOPS. All rights reserved.