Areizen
areizen.bsky.social
Areizen
@areizen.bsky.social
Reverse engineer @synacktiv.com. I appreciate Android related stuff
Reposted by Areizen
Following their presentation at @hexacon.bsky.social, @mtalbi.bsky.social & Etienne detail how they exploited CVE-2023-40129, a critical vulnerability affecting the Bluetooth stack in Android ⬇️

www.synacktiv.com/en/publicati...
Paint it blue: Attacking the bluetooth stack
Paint it blue: Attacking the bluetooth stack
www.synacktiv.com
October 27, 2025 at 4:02 PM
Reposted by Areizen
A technical look at @grapheneos.org Hardened Malloc, a memory allocator designed to mitigate heap corruption vulnerabilities (UAF, overflows) and break common exploit primitives.
Deep dive for security researchers & exploit developers by @nicoski.bsky.social
www.synacktiv.com/en/publicati...
Exploring GrapheneOS secure allocator: Hardened Malloc
Exploring GrapheneOS secure allocator: Hardened Malloc
www.synacktiv.com
September 22, 2025 at 1:41 PM
Reposted by Areizen
We've just released a tool to decrypt all Synology encrypted archives! We used it to compare SynologyPhotos versions and highlight our #Pwn2Own Ireland 2024 vulnerability on the BeeStation BST150-4T. Check out our blog post for more details.
www.synacktiv.com/en/publicati...
Extraction of Synology encrypted archives - Pwn2Own Ireland 2024
Context During Pwn2Own Ireland 2024 we targeted the BeeStation BST150-4T a NAS from Synology.
www.synacktiv.com
August 11, 2025 at 12:02 PM
Reposted by Areizen
While performing security research on IoT control applications, @areizen.bsky.social and cyp discovered critical vulnerabilities in the mobile app for the Eachine E58 drone. These flaws could potentially lead to remote code execution on the user's smartphone.
www.synacktiv.com/en/publicati...
From cheap IoT toy to your smartphone: Getting RCE by leveraging a companion app
As IoT adoption continues to grow, we explored the idea that instead of directly compromising IoT devices, an attacker could target the applications controlling them. This approach could potentially a
www.synacktiv.com
July 8, 2025 at 3:28 PM
Reposted by Areizen
From firmware dumps to wireless exploration — check out our latest dive into DVB receiver analysis and the hidden attack surface it exposes!
www.synacktiv.com/en/publicati...
Hack the channel: A Deep Dive into DVB Receiver Security
Introduction During a garage cleaning, we found a DVB receiver and thought it would be a great target for vulnerability research.
www.synacktiv.com
April 9, 2025 at 6:36 AM
Reposted by Areizen
Interested in vulnerabilities in video games? 🎮
@tomtombinary.bsky.social presented critical flaws in Neverwinter Nights Enhanced Edition at #Hexacon, which could allow attackers to take control of players' computers. 🛡️
Check out the full details of these bugs!👇
www.synacktiv.com/en/publicati...
Exploiting Neverwinter Nights
Introduction Neverwinter Nights is an RPG based video game developed by BioWare and Obsidian Entertainment in 2002.
www.synacktiv.com
March 10, 2025 at 12:36 PM
Reposted by Areizen
We are now on #BlueSky! We'll start posting our news here too 😊
November 22, 2024 at 3:46 PM