May 3, 2026 3 min read
Bypassing Single-Instance Checks: Mutex Manipulation with HueSyncPatch
A technical look at manipulating NT handles to bypass application single-instance enforcement, from an EDR and threat hunting perspective.
Tag archive
Everything currently published under the reverse-engineering tag.
A technical look at manipulating NT handles to bypass application single-instance enforcement, from an EDR and threat hunting perspective.
A disclosure-safe look at using rootless Podman, QEMU user-mode, and AI automation to bring up router firmware in WSL, work through the ugly realities of embedded userspace, and turn 3 findings into a repeatable testing platform.