cube0x8's profile picture. 💻 Vulnerability research, fuzzing, reverse engineering
🚐 Travelling the world with a van
🤘🏻 Metal music supporter

Cube🧊

@cube0x8

💻 Vulnerability research, fuzzing, reverse engineering 🚐 Travelling the world with a van 🤘🏻 Metal music supporter

Cube🧊 reposted

End of day 1: the mhackeroni kitchen is in full swing @defcon CTF - let's cook 🔥 Thanks for the support to 🥇 #7Layers - #DRIVESEC 🥈 @_revng - @KeylessTech - @WuerthPhoenix - @CNIT_TLC 🙌 #STACKBITS

mhackeroni's tweet image. End of day 1: the mhackeroni kitchen is in full swing @defcon CTF  - let's cook 🔥

Thanks for the support to

🥇 #7Layers - #DRIVESEC

🥈 @_revng  - @KeylessTech  - @WuerthPhoenix  - @CNIT_TLC 

🙌 #STACKBITS
mhackeroni's tweet image. End of day 1: the mhackeroni kitchen is in full swing @defcon CTF  - let's cook 🔥

Thanks for the support to

🥇 #7Layers - #DRIVESEC

🥈 @_revng  - @KeylessTech  - @WuerthPhoenix  - @CNIT_TLC 

🙌 #STACKBITS

Cube🧊 reposted

Drop by everyone 🦥

Charlas MainTrack #EKO2024 🔥 📌 @domenuk, Co-Maintainer of LibAFL/AFL++ | Android Red Team 💡 “Advanced Fuzzing With LibAFL”: Fuzzing is the art of uncovering vulnerabilities through rapid target re-executions and intelligent input mutations. In this talk, we'll dive deep…

ekoparty's tweet image. Charlas MainTrack #EKO2024 🔥

📌 @domenuk, Co-Maintainer of LibAFL/AFL++ | Android Red Team

💡 “Advanced Fuzzing With LibAFL”: Fuzzing is the art of uncovering vulnerabilities through rapid target re-executions and intelligent input mutations.

In this talk, we'll dive deep…


Cube🧊 reposted

I know it’d be a bloodbath, but I’d love to see a pwn2own category for so-called security appliances


Cube🧊 reposted

Neat, Intel awarded a $5k bug bounty for this report! We donated it to local food bank @2ndharvest, just in time for Christmas! Thank you!! 🎅

New write-up on an Intel Ice Lake CPU vulnerability, we can effectively corrupt the RoB with redundant prefixes! 🔥 An updated microcode is available today for all affected products, cloud providers should patch ASAP. lock.cmpxchg8b.com/reptar.html



Cube🧊 reposted

I turned a workshop on fuzzing with LibAFL into a blog post for you all, check it out: atredis.com/blog/2023/12/4…


Cube🧊 reposted

Emulated full system snapshot fuzzing by Intel 👀 haunted.computer/@novafacing/11…


Cube🧊 reposted

"How to Build a Fuzzing Corpus" introduces some of the basic theory behind using a seed corpus for fuzzing, and answers three key questions: what is a seed corpus, why are they useful, and how can we build one from scratch? blog.isosceles.com/how-to-build-a…


Cube🧊 reposted

Our work on exploring new ways for efficient firmware fuzzing will be published at @USENIXSecurity 2023! With SAFIREFUZZ, we introduce near-native rehosting, drastically improving the performance of fuzzing embedded targets. Super happy about this work w @domenuk @nSinusR

pr0me's tweet image. Our work on exploring new ways for efficient firmware fuzzing will be published at @USENIXSecurity 2023!

With SAFIREFUZZ, we introduce near-native rehosting, drastically improving the performance of fuzzing embedded targets.

Super happy about this work w @domenuk @nSinusR

Cube🧊 reposted

* The 8 new fuzzers are: AFL+++, AFLrustrust, AFLsmart++, HasteFuzz, LearnPerfFuzz, LibAFL_libFuzzer , Pastis, and symsan. ** The 4 baseline fuzzers are: AFL, AFL++, HonggFuzz, and libFuzzer. They are evaluated by #FuzzBench from Google Open Source Security Team (GOSST).

The battle has started and will last exactly 23 hours, plus hours of post-battle victory assessment. 10k+ CPUs in Google cloud are roaring for this battle. The battle is the #SBFT23 fuzzing competition, and its winners will be crowned on 14 May 2023 in Melbourne, Australia.



Cube🧊 reposted

Pleased to announce that the materials of Hypervisor 101 in Rust🦀is now public! A one-day long course taught at #gccsec, to quickly learn hardware-assisted virtualization technology and its application for high-performance fuzzing on Intel/AMD processors github.com/tandasat/Hyper…


Cube🧊 reposted

LibAFL QEMU full-system mode is a thing! Check out the example that fuzz a small ARM FreeRTOS firmware at github.com/AFLplusplus/Li… Next step: fast memory and devices snapshots


Mgła live @ Principal Club Theater, Thessaloniki. This is quality black metal.

cube0x8's tweet image. Mgła live @ Principal Club Theater, Thessaloniki. 

This is quality black metal.

Cube🧊 reposted

I just released the source code of Paracosme: a zero-click remote memory corruption exploit I demonstrated at Pwn2Own 2022 Miami 🐛🐜🪲 github.com/0vercl0k/parac…


Cube🧊 reposted

LibAFL has now a dedicated paper! We discuss its design and show some experiments comparing compelling approaches. It will appear at CCS '22 this fall. Amazing collab with @domenuk @DongjiaZ @balzarot Preprint at s3.eurecom.fr/docs/ccs22_fio…


Cube🧊 reposted

I've just discovered this amazing document showing super clearly the relation between the opcode and the instruction 🤯 pnx.tf/files/x86_opco…

AliceCliment's tweet image. I've just discovered this amazing document showing super clearly the relation between the opcode and the instruction 🤯

pnx.tf/files/x86_opco…

Cube🧊 reposted

I am very excited to announce that our talk: New Memory Forensics Techniques to Defeat Device Monitoring Malware was accepted at @BlackHatEvents Vegas! blackhat.com/us-22/briefing… @Volexity @volatility @nolaforensix @LSUCCT @lsuresearch #BHUSA #DFIR


Cube🧊 reposted

So uh, NVIDIA apparently just… open-sourced their Linux GPU drivers under a dual MIT/GPL licence. ※ For Ampere and Turing only, at least for now…? developer.nvidia.com/blog/nvidia-re… github.com/NVIDIA/open-gp… … Is the world finally coming to an end?


Loading...

Something went wrong.


Something went wrong.