netsecurity1's profile picture. Security engineer interested in reverse engineering, vulnerability exploitation & low level stuff. Working at @Synacktiv. Techno music enthusiast 🎧

Rémi J.

@netsecurity1

Security engineer interested in reverse engineering, vulnerability exploitation & low level stuff. Working at @Synacktiv. Techno music enthusiast 🎧

Pinned

🚨 Interested in Windows kernel exploitation? Our @sstic 2025 talk on the Shadow Stack implementation in the Windows kernel is now online! 📄 Paper: sstic.org/media/SSTIC202… 📑 Slides: sstic.org/media/SSTIC202…

It's already #SSTIC2025 day 2! @netsecurity1 and us3r present the Windows kernel shadow stack mitigation 🪟

Synacktiv's tweet image. It's already #SSTIC2025 day 2! @netsecurity1 and us3r present the Windows kernel shadow stack mitigation 🪟


Rémi J. reposted

Rémi J. reposted

Nice! Mehdi & Matthieu from @Synacktiv pulled out the RF enclosure to run their exploit of the Phillips Hue Bridge. They were able to exploit it without laying a finger on the device. They're off to the disclosure room to explain themselves. #Pwn2Own


Rémi J. reposted

Unveiling the details of Windows VTL2, despite its absence in the MSDN documentation. 🤔 #hyperv #windows #virtualization howknows.github.io/roooot.github.…


Rémi J. reposted

It's already #SSTIC2025 day 2! @netsecurity1 and us3r present the Windows kernel shadow stack mitigation 🪟

Synacktiv's tweet image. It's already #SSTIC2025 day 2! @netsecurity1 and us3r present the Windows kernel shadow stack mitigation 🪟

Rémi J. reposted

We are at @sstic! If you want to have a chat, our ninjas are easy to spot 🥷

Synacktiv's tweet image. We are at @sstic! If you want to have a chat, our ninjas are easy to spot 🥷

Rémi J. reposted

Confirmed! Thomas Bouzerar (@MajorTomSec) and Etienne Helluy-Lafont from Synacktiv (@Synacktiv) used a heap-based buffer overflow to exploit #VMware Workstation. They earn $80,000 and 8 Master of Pwn points - sending the contest to over $1,000,000 total! #Pwn2Own

thezdi's tweet image. Confirmed! Thomas Bouzerar (@MajorTomSec) and Etienne Helluy-Lafont from Synacktiv (@Synacktiv) used a heap-based buffer overflow to exploit #VMware Workstation. They earn $80,000 and 8 Master of Pwn points - sending the contest to over $1,000,000 total! #Pwn2Own
thezdi's tweet image. Confirmed! Thomas Bouzerar (@MajorTomSec) and Etienne Helluy-Lafont from Synacktiv (@Synacktiv) used a heap-based buffer overflow to exploit #VMware Workstation. They earn $80,000 and 8 Master of Pwn points - sending the contest to over $1,000,000 total! #Pwn2Own

Rémi J. reposted

Synacktiv is looking for an additional team leader in Paris for its Reverse-Engineering Team! Find out if you are a good candidate by reading our offer (🇫🇷). synacktiv.com/responsable-eq…


Rémi J. reposted

📍 RDV ce soir à 19:00 au Peaky Blinders - 83 Cr Charlemagne, 69002 Lyon ! Au programme : - Mehdi (mtalbi 🦋) nous présentera "Escaping from bhyve" ! 🍯 - aiglematth nous présentera "Another one bytes the Rust" ! 🦀 🎤 Un sujet de dernière minute à présenter ? Contactez-nous !


Rémi J. reposted

C'est le premier BiereSecu Lyon de l'année 2025 ! 📍 RDV dès 19:00 ce mercredi 19 février au Peaky Blinders - 83 Cr Charlemagne, 69002 Lyon 🎤 Un sujet à présenter ? Contactez-nous sur Twitter ou via notre Discord ! discord.com/invite/wCHweeqr 👋 A bientôt !


Rémi J. reposted

The Linux Memory Manager preorder and early access book nostarch.com/linux-memory-m…

andersonc0d3's tweet image. The Linux Memory Manager preorder and early access book

nostarch.com/linux-memory-m…
andersonc0d3's tweet image. The Linux Memory Manager preorder and early access book

nostarch.com/linux-memory-m…

Rémi J. reposted

In 2010, Google and Oracle went head-to-head in the biggest copyright case in history. Oracle sued Google for $9B, claiming Google copied 11,000 lines of code to develop Android. Google took a bold stance and argued that its code copying was fair. Here's the full story:

RogerWang11's tweet image. In 2010, Google and Oracle went head-to-head in the biggest copyright case in history.

Oracle sued Google for $9B, claiming Google copied 11,000 lines of code to develop Android.

Google took a bold stance and argued that its code copying was fair.

Here's the full story:
RogerWang11's tweet image. In 2010, Google and Oracle went head-to-head in the biggest copyright case in history.

Oracle sued Google for $9B, claiming Google copied 11,000 lines of code to develop Android.

Google took a bold stance and argued that its code copying was fair.

Here's the full story:

Rémi J. reposted

Recordings of the #HEXACON2024 talks have been uploaded to our YouTube channel 🎬 youtube.com/playlist?list=… See you next year!


Rémi J. reposted

🔥 C'est la reprise du Bière Sécu Lyon ! 📍 RDV à 19:00 le jeudi 17 octobre au Peaky Blinders - 83 Cr Charlemagne, 69002 Lyon 🎤 Un sujet à présenter ? Contactez-nous sur Twitter ou via notre Discord ! discord.com/invite/wCHweeqr 👋 A bientôt !


Rémi J. reposted

What happens if your CPU gets something wrong? If it wakes up one day and decides 2+2=5? Well, most of us will never have to worry about that. But if you work at a company the size of Google, you do, which is why this paper on "mercurial cores" is so fascinating. What the…

petereliaskraft's tweet image. What happens if your CPU gets something wrong? If it wakes up one day and decides 2+2=5?

Well, most of us will never have to worry about that. But if you work at a company the size of Google, you do, which is why this paper on "mercurial cores" is so fascinating.

What the…

Rémi J. reposted

🚨SAVE THE DATE! 🚨 The 2nd Pwn conference of the month is coming up! @voydstack, Security Expert at @Synacktiv and active on Root-Me, will be hosting a live session on Heap exploitation this Friday 16 August at 8pm (UTC+2). 🔥Don't miss this analysis of memory management…

rootme_org's tweet image. 🚨SAVE THE DATE! 🚨

The 2nd Pwn conference of the month is coming up!

@voydstack, Security Expert at @Synacktiv and active on Root-Me, will be hosting a live session on Heap exploitation this Friday 16 August at 8pm (UTC+2).

🔥Don't miss this analysis of memory management…

Rémi J. reposted

Thank you everybody for celebrating 15 years of TROOPERS with us at #TROOPERS24! Have a safe trip home and see you tomorrow at the roundtables or next year at #TROOPERS25.

WEareTROOPERS's tweet image. Thank you everybody for celebrating 15 years of TROOPERS with us at #TROOPERS24! Have a safe trip home and see you tomorrow at the roundtables or next year at #TROOPERS25.
WEareTROOPERS's tweet image. Thank you everybody for celebrating 15 years of TROOPERS with us at #TROOPERS24! Have a safe trip home and see you tomorrow at the roundtables or next year at #TROOPERS25.
WEareTROOPERS's tweet image. Thank you everybody for celebrating 15 years of TROOPERS with us at #TROOPERS24! Have a safe trip home and see you tomorrow at the roundtables or next year at #TROOPERS25.
WEareTROOPERS's tweet image. Thank you everybody for celebrating 15 years of TROOPERS with us at #TROOPERS24! Have a safe trip home and see you tomorrow at the roundtables or next year at #TROOPERS25.

First time at @WEareTROOPERS, thanks for having us :) Feel free to play with our tool, hope it will be useful: github.com/synacktiv/Cach…

Our ninjas are on stage at @WEareTROOPERS! @YofBalibump, @___t0___ and @netsecurity1 are explaining WHFB cache data and its secrets.

Synacktiv's tweet image. Our ninjas are on stage at @WEareTROOPERS! @YofBalibump, @___t0___ and @netsecurity1 are explaining WHFB cache data and its secrets.


Rémi J. reposted

Our ninjas are on stage at @WEareTROOPERS! @YofBalibump, @___t0___ and @netsecurity1 are explaining WHFB cache data and its secrets.

Synacktiv's tweet image. Our ninjas are on stage at @WEareTROOPERS! @YofBalibump, @___t0___ and @netsecurity1 are explaining WHFB cache data and its secrets.

Rémi J. reposted

Kdrill, an open source tool to check if your kernel is rootkited🔥 A python tool to analyze memory dumps AND live kernel. No dep, py2/3, no symbols 💪 It rebuild on the fly kernel structs and check suspicious modifications (and if patchguard is running 👀) github.com/ExaTrack/Kdrill


Loading...

Something went wrong.


Something went wrong.