Currently testing Bluesky. Otherwise on Mastodon.social.
Venez !
Reverse engineering with r2ai
unlockyourbrain.bzh/ateliers/
#UYBHYS25
Venez !
A l'occasion de #UYBHYS25, de 10h à 17h les vendredi 7 et samedi 8 novembre, @ratzillas.bsky.social animera, sur le parvis du #Quartz à #Brest, un atelier de démonstration de "Car Hacking", accessible à toutes et tous sans inscription. 🙂
A l'occasion de #UYBHYS25, de 10h à 17h les vendredi 7 et samedi 8 novembre, @ratzillas.bsky.social animera, sur le parvis du #Quartz à #Brest, un atelier de démonstration de "Car Hacking", accessible à toutes et tous sans inscription. 🙂
Il reste encore des places pour quelques ateliers de vendredi et pour la journée de conférences de samedi.
Billetterie : pretix.eu/cantine/UYBH...
Il reste encore des places pour quelques ateliers de vendredi et pour la journée de conférences de samedi.
Billetterie : pretix.eu/cantine/UYBH...
Pre-requisites: you are good to go if you already have reversed a binary (with whatever #disassembler, it doesn't matter) OR if you have basic skills and understanding in #assembly.
#mcp #LLM #AI
Pre-requisites: you are good to go if you already have reversed a binary (with whatever #disassembler, it doesn't matter) OR if you have basic skills and understanding in #assembly.
#mcp #LLM #AI
Understand what a recent sample of Linux/Trigona #ransomware does.
Learn how to spot #AI errors (hallucinations, omissions etc), learn how to tweak context length, output token limits to get the best out of your model.
#barbhack25
Understand what a recent sample of Linux/Trigona #ransomware does.
Learn how to spot #AI errors (hallucinations, omissions etc), learn how to tweak context length, output token limits to get the best out of your model.
#barbhack25
One of them was that, obviously the tool needed to be used by an experienced reverse engineer.
I'd like to comment a bit further.
I feel normal that such a tool cannot be used by total beginners. All jobs require some adequate training. 1/n
One of them was that, obviously the tool needed to be used by an experienced reverse engineer.
I'd like to comment a bit further.
I feel normal that such a tool cannot be used by total beginners. All jobs require some adequate training. 1/n
#barbhack25
#barbhack25
barbhack.fr/2025/fr/conf...
There will be 2 demos.
One live.
One recorded - simply because I don't have the guts to do it live ;P
We reverse engineer Linux/Trigona and Linux/Shellcode with radare2 + AI + HI
HI standards for Human Intelligence ;P
barbhack.fr/2025/fr/conf...
There will be 2 demos.
One live.
One recorded - simply because I don't have the guts to do it live ;P
We reverse engineer Linux/Trigona and Linux/Shellcode with radare2 + AI + HI
HI standards for Human Intelligence ;P
They are actually a burden to other domains such as browser extensions. This research, by Marek Toth, shows how click jacking [on hidden overlays] can trick the end-user in sharing his/her entire password manager.
marektoth.com/blog/dom-bas...
They are actually a burden to other domains such as browser extensions. This research, by Marek Toth, shows how click jacking [on hidden overlays] can trick the end-user in sharing his/her entire password manager.
marektoth.com/blog/dom-bas...
Whether you have fresh research, practical insights, or real-world case studies to share, now is your moment to step into the spotlight!
📅 24 Aug 2025 — only 5 days left
📍 Berlin. 24–26 Sept 2025
👉 tinyurl.com/3mccm8br
Whether you have fresh research, practical insights, or real-world case studies to share, now is your moment to step into the spotlight!
📅 24 Aug 2025 — only 5 days left
📍 Berlin. 24–26 Sept 2025
👉 tinyurl.com/3mccm8br
Exploiting the Thermomix.
Hey @synacktiv.com can you cook me a chocolate cake? ;-)
www.synacktiv.com/en/publicati...
Exploiting the Thermomix.
Hey @synacktiv.com can you cook me a chocolate cake? ;-)
www.synacktiv.com/en/publicati...
Examples on Linux/Trigona, Linux/Prometei, Linux/Ladvix and Android/SpyLoan.
Enjoy.
#malware #r2ai #r2 #claude #delphi #trigona #rust #flutter
cryptax.medium.com/w32-skyai-us...
- Where the malware loads the AI prompt, what for, why it fails.
- How to find the encryption key with AI
- Extract & decrypt the embedded PE
- How the malware checks if it's on a VM
- R2ai tips when curl argument is too long
cryptax.medium.com/w32-skyai-us...
- Where the malware loads the AI prompt, what for, why it fails.
- How to find the encryption key with AI
- Extract & decrypt the embedded PE
- How the malware checks if it's on a VM
- R2ai tips when curl argument is too long
@tixlegeek.bsky.social dans le Twitch @laluka.bsky.social EP 193, et j'ai codé pour Pico :)
@tixlegeek.bsky.social dans le Twitch @laluka.bsky.social EP 193, et j'ai codé pour Pico :)
In 2024, Nicolas used Qiling to solve the Ph0wn CTF teaser. See how here: github.com/ph0wn/writeu...
#qiling #CTF #binary
In 2024, Nicolas used Qiling to solve the Ph0wn CTF teaser. See how here: github.com/ph0wn/writeu...
#qiling #CTF #binary
This is the official "Cryptax Award 2025 H1" (lol). Congrats!
cryptax.github.io/nomination-2...
cc: @elbsides.bsky.social @northsec.io @radareorg.bsky.social @bsideskrs.bsky.social
This is the official "Cryptax Award 2025 H1" (lol). Congrats!
cryptax.github.io/nomination-2...
cc: @elbsides.bsky.social @northsec.io @radareorg.bsky.social @bsideskrs.bsky.social
Antivirus is not stupid and does NOT rely on fixed hashes or whatever to detect malware.
This is an outdated myth from prehistoric times.
Malware "signatures" understand binary formats + assembly and can easily dynamically detect variants.
Antivirus is not stupid and does NOT rely on fixed hashes or whatever to detect malware.
This is an outdated myth from prehistoric times.
Malware "signatures" understand binary formats + assembly and can easily dynamically detect variants.
I even hope to have time for a short demo :)
#AI #malware #keynote #elbsides
I even hope to have time for a short demo :)
#AI #malware #keynote #elbsides
Really looking forward to seeing a full conference room on Friday and listening to our wonderful speakers presenting their latest insights.
#Elbsides2025 #Infosec #Cybersecurity #Hamburg
Really looking forward to seeing a full conference room on Friday and listening to our wonderful speakers presenting their latest insights.
#Elbsides2025 #Infosec #Cybersecurity #Hamburg
1/2
1/2
It shows how GitHub MCP can be exploited to leak private information. You create a dummy issue with a prompt that asks to leak the information, and there it goes.
It shows how GitHub MCP can be exploited to leak private information. You create a dummy issue with a prompt that asks to leak the information, and there it goes.
👉 radare.org/con/2025
👉 radare.org/con/2025