About

About

🔧 Alessandro Magnosi (klezVirus)

“Just a noob with a passion for what runs under the hood.”

Hi, I’m Alessandro, but I go with the nick “klez”. I like to explore how things work under the surface. From undocumented syscalls to adversarial AI models, I enjoy poking at the edges of systems, breaking things (sometimes gently), and sharing what I learn along the way.

I’m a proud member of the SpecterOps Adversary Simulation Team!

Trivia

People often ask — why Klez virus? Well, Klez wasn’t the most technically advanced malware out there (especially compared to Stuxnet or Mydoom), but it still wreaked havoc: it infected around 7 million computers and caused nearly $20 billion in damages (primarily from cleanup and recovery efforts).

I chose klezVirus as a moniker because I’m drawn to simplicity: real intelligence lies in reducing complexity, not adding layers. That doesn’t mean it’s not creative or dangerous; sometimes the most effective solutions aren’t the most complicated ones, and you can achieve significant impact through clear, clever execution.

✦ Things I care about:

  • 🧬 Windows Internals (user & kernel mode): I dig through APIs, system calls, and obscure Windows internals just for the fun of it — and occasionally to build something useful.
  • 🤖 AI & Machine Learning: I’m fascinated by how models behave, how they break, and how they can be secured (or abused). Researching ML security feels like cheating at science.
  • Blockchain & Distributed Systems: I enjoy experimenting with trustless networks, identity models, and how distributed systems can be misused or protected.
  • 🤝 Community, Sharing & FOSS: Whether it’s at conferences, webinars, or late-night blog posts — I love connecting with people, learning from them, and giving back to the open-source world.

✦ Some things I’ve worked on:

  • 🔄 Call Stack & System-Call Obfuscation: StackMoonwalk, Half-Moon, and creative abuse of RPC threading models ([Blog][1], [LinkedIn][2]).
  • 💥 Bypassing Modern Defenses: Building PoCs that explore how mitigations can fail (and how defenders can adapt).
  • 🎤 Speaking at Conferences: DEF CON, x33fcon, HITB, BruCON, RomHack — sharing small insights from my research, always learning more than I give ([YouTube][3]).
  • 🛠 Open Source Projects: Tools like Inceptor and StackMoonwalk, developed with friends and collaborators at Porchetta Industries and beyond ([infosecurity.us][4]).

🌐 Affiliations

  • SpecterOps — Senior Security Consultant in their Security Testing team (SpecterOps).

Public talks collection: (YouTube)

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
                                                                         
                                     ########################.                        
                                  ##########################+##                       
                                .#++############################-                     
                               .#+################################                    
                   ...         #################################+##         ...       
                 .####        .#.################################ #.       +####.     
                .###..        .#.################################.#         ..###     
                .##+           #.#.############################ #+#           +##     
                .##+           #+#+################################           +##     
                ###-           #######+.    ####+####-    -#####-#+           -###    
             -####-           -#####-+    . +########  -    #### #-            .####+ 
             .####.           -# #####+ -#. ####.####- +# .######-#            -####- 
                +##-          -#+##############   ###############.#.          -##-    
                .##+           ################ + -###############-           +##     
                .##+            .#####-# -##############..#-#####             +##     
                 ###..            #-####..############## .#-####            .-###     
                 -####            ######++#++#######++-#-+######           +####.     
                                  ##############################                      
                                   #######--#.-.-.-.-.--#######-                      
                                    -######--#.-.-.-.--######+                        
                                      +####################-                          
                                        +################.                            
                                                             

I hope that this site would be beneficial to anyone reading it.