Rémi J.
@netsecurity1
Security engineer interested in reverse engineering, vulnerability exploitation & low level stuff. Working at @Synacktiv. Techno music enthusiast 🎧
You might like
🚨 Interested in Windows kernel exploitation? Our @sstic 2025 talk on the Shadow Stack implementation in the Windows kernel is now online! 📄 Paper: sstic.org/media/SSTIC202… 📑 Slides: sstic.org/media/SSTIC202…
It's already #SSTIC2025 day 2! @netsecurity1 and us3r present the Windows kernel shadow stack mitigation 🪟
@__sethJenkins broke kASLR by doing … nothing 😩 googleprojectzero.blogspot.com/2025/11/defeat…
Nice! Mehdi & Matthieu from @Synacktiv pulled out the RF enclosure to run their exploit of the Phillips Hue Bridge. They were able to exploit it without laying a finger on the device. They're off to the disclosure room to explain themselves. #Pwn2Own
Unveiling the details of Windows VTL2, despite its absence in the MSDN documentation. 🤔 #hyperv #windows #virtualization howknows.github.io/roooot.github.…
It's already #SSTIC2025 day 2! @netsecurity1 and us3r present the Windows kernel shadow stack mitigation 🪟
We are at @sstic! If you want to have a chat, our ninjas are easy to spot 🥷
Confirmed! Thomas Bouzerar (@MajorTomSec) and Etienne Helluy-Lafont from Synacktiv (@Synacktiv) used a heap-based buffer overflow to exploit #VMware Workstation. They earn $80,000 and 8 Master of Pwn points - sending the contest to over $1,000,000 total! #Pwn2Own
Synacktiv is looking for an additional team leader in Paris for its Reverse-Engineering Team! Find out if you are a good candidate by reading our offer (🇫🇷). synacktiv.com/responsable-eq…
📍 RDV ce soir à 19:00 au Peaky Blinders - 83 Cr Charlemagne, 69002 Lyon ! Au programme : - Mehdi (mtalbi 🦋) nous présentera "Escaping from bhyve" ! 🍯 - aiglematth nous présentera "Another one bytes the Rust" ! 🦀 🎤 Un sujet de dernière minute à présenter ? Contactez-nous !
C'est le premier BiereSecu Lyon de l'année 2025 ! 📍 RDV dès 19:00 ce mercredi 19 février au Peaky Blinders - 83 Cr Charlemagne, 69002 Lyon 🎤 Un sujet à présenter ? Contactez-nous sur Twitter ou via notre Discord ! discord.com/invite/wCHweeqr 👋 A bientôt !
The Linux Memory Manager preorder and early access book nostarch.com/linux-memory-m…
In 2010, Google and Oracle went head-to-head in the biggest copyright case in history. Oracle sued Google for $9B, claiming Google copied 11,000 lines of code to develop Android. Google took a bold stance and argued that its code copying was fair. Here's the full story:
Recordings of the #HEXACON2024 talks have been uploaded to our YouTube channel 🎬 youtube.com/playlist?list=… See you next year!
🔥 C'est la reprise du Bière Sécu Lyon ! 📍 RDV à 19:00 le jeudi 17 octobre au Peaky Blinders - 83 Cr Charlemagne, 69002 Lyon 🎤 Un sujet à présenter ? Contactez-nous sur Twitter ou via notre Discord ! discord.com/invite/wCHweeqr 👋 A bientôt !
What happens if your CPU gets something wrong? If it wakes up one day and decides 2+2=5? Well, most of us will never have to worry about that. But if you work at a company the size of Google, you do, which is why this paper on "mercurial cores" is so fascinating. What the…
🚨SAVE THE DATE! 🚨 The 2nd Pwn conference of the month is coming up! @voydstack, Security Expert at @Synacktiv and active on Root-Me, will be hosting a live session on Heap exploitation this Friday 16 August at 8pm (UTC+2). 🔥Don't miss this analysis of memory management…
Thank you everybody for celebrating 15 years of TROOPERS with us at #TROOPERS24! Have a safe trip home and see you tomorrow at the roundtables or next year at #TROOPERS25.
First time at @WEareTROOPERS, thanks for having us :) Feel free to play with our tool, hope it will be useful: github.com/synacktiv/Cach…
Our ninjas are on stage at @WEareTROOPERS! @YofBalibump, @___t0___ and @netsecurity1 are explaining WHFB cache data and its secrets.
Our ninjas are on stage at @WEareTROOPERS! @YofBalibump, @___t0___ and @netsecurity1 are explaining WHFB cache data and its secrets.
Kdrill, an open source tool to check if your kernel is rootkited🔥 A python tool to analyze memory dumps AND live kernel. No dep, py2/3, no symbols 💪 It rebuild on the fly kernel structs and check suspicious modifications (and if patchguard is running 👀) github.com/ExaTrack/Kdrill
United States Trends
- 1. #Worlds2025 34K posts
- 2. #TalusLabs N/A
- 3. Raindotgg 1,824 posts
- 4. #T1WIN 24.3K posts
- 5. Doran 13.5K posts
- 6. Sam Houston 1,499 posts
- 7. Oregon State 4,775 posts
- 8. Boots 28.7K posts
- 9. Boots 28.7K posts
- 10. Louisville 14.3K posts
- 11. #GoAvsGo 1,550 posts
- 12. Batum N/A
- 13. Faker 29.3K posts
- 14. #Toonami 2,403 posts
- 15. UCLA 7,797 posts
- 16. Miller Moss 1,230 posts
- 17. Oilers 5,123 posts
- 18. Emmett Johnson 2,513 posts
- 19. Nuss 5,714 posts
- 20. Hyan 1,328 posts
You might like
-
Eloi Benoist-Vanderbeken
@elvanderb -
F4b
@0xf4b -
Fist0urs
@Fist0urs -
cleptho
@cleptho -
paulfariello ✏️
@paulfariello -
ExaTrack
@ExaTrack -
Karion
@Karion_ -
Samuel Chevet
@w4kfu -
Lucas Georges
@_lucas_georges_ -
Quentin M
@0xdagger -
cbayet
@OnlyTheDuck -
Aymeric P.
@bak_sec -
xarkes
@xarkes_ -
JB Cayrou
@jbcayrou -
Clement Rouault
@hakril
Something went wrong.
Something went wrong.