Our 2025-2026 internship season has started. Check out the list of openings and apply for fun and knowledge! image
Finding a buggy driver is one thing, abusing it is another🧠 In his latest blog post, Luis Casvella shows you how BYOVD can be used as a Reflective Rootkit Loader ! πŸš€ ➑️ image
BYOVD is a well-known technique commonly used by threat actors to kill EDR πŸ”ͺ However, with the right primitives, you can do much more. Find out how Luis Casvella found and exploited 4 vulns (CVE-2025-8061) in a signed Lenovo driver. πŸ‘‡ image
RTFM they say but if you read the manual and copy code examples from it you may inadvertently introduce vulns in your code πŸ™€ In April we audited the PHP code. Now we followed up with a review of the code snippets in PHP documentation and found 81 issues πŸ‘‡
Hacking & Barbecue in the south of France What could possibly be better? Barbhack 2025 starts this Saturday August 30th at the Palais des Congrès Neptune in Toulon We are giving away a ticket to a student nearby looking to live the experience. Send us a DM with your name and school. We will notify the winner tonight. image
Unrestrict the restricted mode for USB on iPhone. A first analysis @npub12h89...ac3t #CVE-2025-24200 πŸ‘‰ image
Good tools are made of bugs: How to monitor your Steam Deck with one byte. Finding and exploiting two vulnerabilities in AMD's UEFI firmware for fun and gaming. A Christmas gift in February, brought to you by the incredible @Gwaby 🫢 image
πŸ‘‹ Looking for some cool research opportunities in 2025? We still have an open position in our 2024-2025 internships season. Take a look and hurry up to submit, those satellites won't hack themselves
Finding and chaining 4 vulns to exfiltrate encryption keys from the Android Keystore on Samsung series A* devices. Did you miss the "Attacking the Samsung Galaxy A* Boot Chain" talk by [@max_r_b]( ) and RaphaΓ«l Neveu earlier this year ? Talk && PoC || GTFO: image
Don't you miss the golden era of SQL Injections? Here Mathieu Farrell (@Coiffeur) explains how to feel the thrill again with the aid of Apache Superset, XML and a bit of parsing tickery: "Bypass Apache Superset restrictions to perform SQL Injections" image