Hey, I'm Vibhek.
Welcome to OpenDoors. This is my logbook for security research, backend engineering, and the production lessons that surface while building real systems.
Latest posts
-
Ferrox: Dissecting a Modern Rust-Based Infostealer
A deep technical analysis of Ferrox — a Windows stealer written in Rust featuring Hell's Gate syscalls, polymorphic builds, Chrome App-Bound Encryption bypass, and advanced anti-analysis techniques. Research conducted in isolated VM environment.
-
Building the First Open-Source DMA HWID Spoofer
How I reverse engineered Windows 11 kernel drivers with IDA Pro to build a DMA-based hardware ID spoofer in Rust — covering PatchGuard, DSE, SMBIOS, and 12 spoofing modules.
-
Zero Auth, Full Control: The Risks of Open Claude Code Web UIs
A security analysis of open-source web UIs for Claude Code. Finding unauthenticated RCE, path traversal, and client-side auth bypasses in community projects.
-
The Hidden Risks of Exposed LM Studio Servers
Investigating how LM Studio's local server feature can expose your AI models to the public internet, and how to secure it.