Key Windows Security Researchers

Last updated: 2026-04-15
Related: Papers And Blogs
Tags: kernel-mode, user-mode

Summary

Knowing who the best researchers are and what they focus on lets you prioritize whose work to study, whose blog to follow, and whose conference talks to watch. This page catalogs elite Windows security researchers by specialty.


Kernel Exploitation

ResearcherAffiliation (notable)FocusWhere to find
j00ru (Mateusz Jurczyk)Google Project Zerowin32k, kernel pool, GDI, font bugsgoogleprojectzero.blogspot.com
Gynvael ColdwindGoogle Project Zerokernel, reversing, CTFgynvael.coldwind.pl
James ForshawGoogle Project ZeroWindows internals, TOCTOU, COM, RPCtyranidslair.blogspot.com
Alex IonescuWinsider / CrowdStrikeWindows internals, hypervisor, KPP, CET, CLFSgithub.com/ionescu007 (incl. clfs-docs — authoritative CLFS structure reference)
Tarjei MandtAzimuth SecurityKernel pool exploitationBlack Hat papers
Enrico PerlaIndependentKernel exploitation techniqueskernelpool.substack.com
Jann HornGoogle Project ZeroKernel races, Linux+Windowsgoogleprojectzero.blogspot.com
0vercl0k (Axel Souchet)Microsoft / independentWTF fuzzer, snapshot fuzzinggithub.com/0vercl0k
Boris Larin (oct0xor)Kaspersky GReATCLFS exploit analysis, ransomware threat intelligence, ITW zero-day detectionsecurelist.com — “Windows CLFS and five exploits” series (CVE-2022-24521, -37969, -23376, -28252)
Connor McGarrMicrosoftWindows kernel internals, KCET shadow stacks, VTL secure calls, browser exploitationconnormcgarr.github.io — KCET series, SkBridge, Vtl1Mon
HN SecurityHN Security (Italy)CLFS deep dives (CVE-2024-49138 two-part analysis)hnsecurity.it
Ong How ChongStarLabsCVE-2025-29824 (CClfsLogCcb UAF)blog.starlabs.sg
Kai Lu / Brett Stone-GrossZscaler ThreatLabzCLFS ITW exploit capture and analysis (CVE-2022-37969 parts 1+2)zscaler.com
Đào Tuấn LinhStarLabsCVE-2024-26230 (tapisrv.dll UAF, CFG bypass via imported Win32 calls, PrintSpoofer escalation)starlabs.sg/blog
Cherie-Anne LeeStarLabsCVE-2024-30085 (cldflt.sys heap overflow, ALPC handle table spray, PipeAttribute AAR, KALPC_MESSAGE AAW)starlabs.sg/blog
Chen Le QiStarLabsCVE-2024-43626 (OOB read/info leak in GetPriorityList/_wcsupr), kernel exploitation guidancex.com/cplearns2h4ck
Alex BirnbergSSD Security ResearchCVE-2021-31969 (cldflt.sys LFH→VS cross-subsegment overflow; NtSetInformationToken/TokenBnoIsolation AAR/AAW)ssd-disclosure.com
Alex PlaskettNCC GroupCVE-2021-31956 (NTFS EA heap overflow → WNF pool spray); first public WNF-as-grooming-primitive technique; NTFS exploitation chain with PreviousModeresearch.nccgroup.com
Alexandre BorgesIndependent“Exploiting Reversing (ER)” series: kernel driver reversing, CVE-2024-30085 full exploit (ERS_06-08 — 4 variants: ALPC write, token steal, I/O Ring v1/v2); Hyper-V intro; patch diffing; I/O Ring AAR/AAW techniqueexploitreversing.com
Yarden ShafirTrail of BitsWNF Code Integrity state names (CI.dll→WNF notification pipeline); Windows kernel exploitation; CET shadow stacks; I/O Ring exploit primitive (original — TyphoonCon 2022: RegBuffers overwrite → full AAR/AAW on Win11)windows-internals.com, twitter.com/yarden_shafir
Angelboy (Scott Chen)DEVCOREWindows Kernel Streaming attack surface: “Proxying to Kernel” bug class (KsSynchronousIoControlDevice always KernelMode); 20+ KS CVEs 2023-2024; CVE-2024-35250/30084 (Pwn2Own Vancouver 2024); CVE-2024-30090 (novel SeDebugPrivilege LUID EoP); MDL bug classes (uninitialized PFN, mismatch, misalignment)devco.re/blog
chompie1337IBM X-ForceMSKSSRV exploitation: CVE-2023-36802 (type confusion exploit writeup); CVE-2024-30089 (Pwn2Own 2024 reference count bug); WinDNS SIGRed RCE PoCsecurityintelligence.com, chomp.ie
Gabrielle VialaQuarkslabWNF internals (“Playing with the Windows Notification Facility” — Black Hat 2018 with Ionescu); WNF structure reverse engineeringquarkslab.com
hieu.q + voidsecCrowdfenseCVE-2024-21338 (appid.sys untrusted pointer dereference → AAW via DbgkpTriageDumpRestoreState gadget; PreviousMode flip + SeDebugPrivilege paths; Lazarus FudModule rootkit ITW); CVE-2025-53136 (NT kernel TOKEN address leak via NtQueryInformationToken TOCTOU; KASLR defeat from AppContainer)crowdfense.com
Marcus Hutchins (MalwareTech)Independenttcpip.sys IPv6 stack deep dive; CVE-2024-38063 root cause analysis and DoS PoC; reverse-engineered undocumented tcpip.sys structures (Packet_t, Reassembly_t, Demuxer dispatch table); also known for taking down WannaCry sinkholemalwaretech.com
Axel “0vercl0k” SouchetMicrosoft (previously)WTF snapshot fuzzer; tcpip.sys reverse engineering (CVE-2021-24086 “Packet of Death” — first public PoC + deep struct analysis); NET_BUFFER/MDL internals; foundational reference for all tcpip.sys researchgithub.com/0vercl0k, doar-e.github.io
Francisco FalconQuarkslabCVE-2021-24086 (independent analysis + PoC); IPv6 nested fragment technique (xzibit fragments-within-fragments attack); tcpip.sys fragmentation internalsblog.quarkslab.com
piazztMicrosoft SecurityInternally discovered CVE-2021-24086, CVE-2021-24074, CVE-2021-24094 (all patched Feb 2021 Patch Tuesday)@piazzt on Twitter
pi3IndependentCVE-2020-16898 “Bad Neighbor” — first public PoC and blog post within days of patch drop; ICMPv6 RDNSS exploitationblog.pi3.com.pl
Armis Research TeamArmisCVE-2021-24094 (IPv6 recursive reassembly UAF + novel firewall bypass primitive via type confusion); URGENT/11 (embedded TCP/IP stack vulnerabilities in VxWorks/IPnet)armis.com/blog
Tim LauFortiGuard LabsCVE-2022-21907 (http.sys uninitialized MDL analysis — tracked down the Tracker->0x80 uninitialized MDL crash path)fortinet.com/blog
Xiao WeiKunlun LabCVE-2024-38063 — discovery and responsible disclosure; CVSS 9.8 tcpip.sys zero-click wormable IPv6 RCECredited in MSRC advisory

win32k / GDI / Graphics

ResearcherNotable Work
j00ruMultiple win32k UAF CVEs, font bugs, GDI exploitation
Yuki Chenwin32k type confusion, CFG bypasses
Hao Xuwin32k kernel bugs
Connor McGarrwin32k exploitation write-ups

User-Mode / Browser Exploitation

ResearcherAffiliationFocus
saelo (Samuel Groß)Google Project ZeroBrowser engines, JIT, WebKit/V8
Ivan FratricGoogle Project ZeroBrowser fuzzing (WinAFL)
LokihardtGoogle Project ZeroJavaScript engine bugs
Bruno KeithGoogle Project ZeroBrowser security

Hypervisor / VBS

ResearcherFocus
Alex IonescuHyper-V internals, VBS, secure kernel
Nicolas JolyHyper-V, sandbox escapes
Peleg HadarHyper-V, VBS, HVCI
Alex MatrosovFirmware/UEFI, HVCI bypass

cldflt.sys / Cloud Filter

ResearcherNotable Work
Alex Birnberg (SSD)CVE-2021-31969 — first cldflt exploit; cross-subsegment LFH→VS overflow technique
Cherie-Anne Lee (StarLabs)CVE-2024-30085 — cldflt BITMAP element bounds check bypass; ALPC handle table + PipeAttribute exploit chain

BYOVD / Driver Exploitation

ResearcherAffiliationNotable Work
Ilia DafchevIndependentWRMSR BYOVD exploitation — full chain (LSTAR overwrite, IRETQ entry frame, SMAP bypass via RFLAGS AC bit, swapgs+sysret return); CVE-2021-3437 WRMSR class; blog: idafchev.github.io

RPC / User-Mode LPE / AppContainer Escape

ResearcherAffiliationNotable Work
k0shlCyber KunlunCVE-2022-22715 (Windows Dirty Pipe / npfs.sys LFH→VS cross-subsegment overflow → AppContainer escape; TianfuCup 2021); CVE-2023-28229 + CVE-2023-36906 (CNG Key Isolation UAF + OOB read → lsass DLL injection from AppContainer); CVE-2024-26230 (tapisrv UAF + XFG bypass via VirtualAlloc address prediction trick); blog: whereisk0shl.top

Remote Exploitation / RCE

ResearcherAffiliationNotable Work
Sagi TzadikCheck Point ResearchCVE-2020-1350 (SIGRed) — discovered 17-year-old integer overflow in Windows DNS Server SIG record parsing; first to document the DNS name compression inflation trick and full root cause; blog: research.checkpoint.com
chompie1337IndependentCVE-2020-1350 (SIGRed) — first and only public RCE PoC; WinDNS custom allocator grooming, TTL-as-heap-primitive technique, DNS_Timeout arbitrary read/write primitive chain, CFG bypass via valid-but-exploitable targets; github.com/chompie1337

TOCTOU / Logic Bugs / LPE

ResearcherNotable Work
James ForshawDozens of TOCTOU bugs, symbolic link abuse framework (NtApiDotNet)
SandboxEscaperNumerous LPE 0-days published publicly (2018-2019)
Abdelhamid NaceriMultiple LPE CVEs, Windows Installer races

Top Conference Venues

ConferenceRelevance
Black Hat USA/EUWindows kernel, mitigations, new techniques
OffensiveConPure offensive focus — kernel, browsers
DEF CONExploits, offensive techniques
BlueHatMicrosoft’s own security conference
INFILTRATEElite offensive techniques
Hardwear.ioFirmware, hardware security
POC (Power of Community)Korean security research

Key Twitter/X Accounts

  • @j00ru — Mateusz Jurczyk (Windows kernel)
  • @tyranidslair — James Forshaw
  • @aionescu — Alex Ionescu
  • @0vercl0k — Axel Souchet (WTF fuzzer)
  • @matrosov — Alex Matrosov (firmware)
  • @oct0xor — Boris Larin (Kaspersky, CLFS/ransomware ITW)
  • @connormcgarr — Connor McGarr (KCET, VTL, browser)

References

  • Google Project Zero — googleprojectzero.blogspot.com
  • Winsider Seminars — alex-ionescu.com
  • Corelan Team — corelan.be