About
🔧 Alessandro Magnosi (klezVirus)
“Just a noob with a passion for what runs under the hood.”
Hi, I’m Alessandro, but I go with the nick “klez”. I like to explore how things work under the surface. From undocumented syscalls to adversarial AI models, I enjoy poking at the edges of systems, breaking things (sometimes gently), and sharing what I learn along the way.
I’m a proud member of the SpecterOps Adversary Simulation Team!
Trivia
People often ask — why Klez virus? Well, Klez wasn’t the most technically advanced malware out there (especially compared to Stuxnet or Mydoom), but it still wreaked havoc: it infected around 7 million computers and caused nearly $20 billion in damages (primarily from cleanup and recovery efforts).
I chose klezVirus as a moniker because I’m drawn to simplicity: real intelligence lies in reducing complexity, not adding layers. That doesn’t mean it’s not creative or dangerous; sometimes the most effective solutions aren’t the most complicated ones, and you can achieve significant impact through clear, clever execution.
✦ Things I care about:
- 🧬 Windows Internals (user & kernel mode): I dig through APIs, system calls, and obscure Windows internals just for the fun of it — and occasionally to build something useful.
- 🤖 AI & Machine Learning: I’m fascinated by how models behave, how they break, and how they can be secured (or abused). Researching ML security feels like cheating at science.
- ⛓ Blockchain & Distributed Systems: I enjoy experimenting with trustless networks, identity models, and how distributed systems can be misused or protected.
- 🤝 Community, Sharing & FOSS: Whether it’s at conferences, webinars, or late-night blog posts — I love connecting with people, learning from them, and giving back to the open-source world.
✦ Some things I’ve worked on:
- 🔄 Call Stack & System-Call Obfuscation: StackMoonwalk, Half-Moon, and creative abuse of RPC threading models ([Blog][1], [LinkedIn][2]).
- 💥 Bypassing Modern Defenses: Building PoCs that explore how mitigations can fail (and how defenders can adapt).
- 🎤 Speaking at Conferences: DEF CON, x33fcon, HITB, BruCON, RomHack — sharing small insights from my research, always learning more than I give ([YouTube][3]).
- 🛠 Open Source Projects: Tools like Inceptor and StackMoonwalk, developed with friends and collaborators at Porchetta Industries and beyond ([infosecurity.us][4]).
🌐 Affiliations
- SpecterOps — Senior Security Consultant in their Security Testing team (SpecterOps).
🎙 Featured Talks
- DEF CON 31 – StackMoonwalk: A novel approach to stack spoofing on Windows x64 (Alessandro Magnosi & Arash Parsa)
- DEF CON 32 - DriverJack: Turning NTFS and emulated read-only filesystems into an infection vector - Alessandro Magnosi
Public talks collection: (YouTube)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
########################.
##########################+##
.#++############################-
.#+################################
... #################################+## ...
.#### .#.################################ #. +####.
.###.. .#.################################.# ..###
.##+ #.#.############################ #+# +##
.##+ #+#+################################ +##
###- #######+. ####+####- -#####-#+ -###
-####- -#####-+ . +######## - #### #- .####+
.####. -# #####+ -#. ####.####- +# .######-# -####-
+##- -#+############## ###############.#. -##-
.##+ ################ + -###############- +##
.##+ .#####-# -##############..#-##### +##
###.. #-####..############## .#-#### .-###
-#### ######++#++#######++-#-+###### +####.
##############################
#######--#.-.-.-.-.--#######-
-######--#.-.-.-.--######+
+####################-
+################.
I hope that this site would be beneficial to anyone reading it.