XENOPS
Blog Tags
XENOPS Research
Author

XENOPS Research

Research Team

Security research notes focused on reverse engineering, detection engineering, incident response, and infrastructure tradeoffs that hold up in production.

Breaking the Cube
Mar 06, 2026
XENOPS Research

Breaking the Cube

Reverse engineering ionCube's Zend VM hooks and the opcode dispatch it drives.

  • Reverse Engineering
  • PHP
  • ionCube
Test Post: Visuals, Code, and Callouts
Feb 17, 2026
XENOPS Research

Test Post: Visuals, Code, and Callouts

A visual smoke test covering images, code blocks, and callout styling.

  • Test
  • Layout
  • MDX
Detecting Low-and-Slow Beaconing in Endpoint Telemetry
Dec 06, 2025
XENOPS Research

Detecting Low-and-Slow Beaconing in Endpoint Telemetry

A repeatable method for surfacing beacon patterns that evade simple interval checks.

  • Detection
  • Telemetry
  • Endpoint
SSL MITM Behavior in Embedded Management Firmware
Nov 18, 2025
XENOPS Research

SSL MITM Behavior in Embedded Management Firmware

Mapping certificate validation gaps across common out-of-band management stacks.

  • Reverse Engineering
  • Firmware
  • TLS
Credential Rotation Under Active Intrusion
Oct 02, 2025
XENOPS Research

Credential Rotation Under Active Intrusion

A staged rotation plan that avoids service collapse while removing attacker persistence.

  • Incident Response
  • Identity
  • Operations
Cloud Token Drift After Service Decommission
Sep 14, 2025
XENOPS Research

Cloud Token Drift After Service Decommission

Tracking long-lived tokens that persist after service teardown.

  • Cloud
  • Identity
  • Exposure
Container Escape Audit Checklist
Aug 28, 2025
XENOPS Research

Container Escape Audit Checklist

A compact checklist for evaluating escape paths before production rollout.

  • Containers
  • Hardening
  • Runtime
XENOPS © 2026 XENOPS. All rights reserved.