@masthoon Profile picture

Mastho

@masthoon

Security Researcher

Similar User
Eloi Benoist-Vanderbeken photo

@elvanderb

Synacktiv photo

@Synacktiv

F4b photo

@0xf4b

David B. photo

@_p0ly_

Axel Souchet photo

@0vercl0k

Hexacon photo

@hexacon_fr

vdehors photo

@vdehors

Cedric Halbronn photo

@saidelike

TouF photo

@T00uF

Jeremy Fetiveau photo

@__x86

Sideway photo

@SidewayRE

Karion photo

@Karion_

Corentin BAYET photo

@OnlyTheDuck

Clement Rouault photo

@hakril

LE BERRE Stéfan photo

@Heurs

Mastho Reposted

The report of the #FreeBSD audit conducted by @masthoon and @jbcayrou is finally out! freebsdfoundation.org/blog/strengthe…


Mastho Reposted

"0-click RCE on Tesla Model 3 through TPMS Sensors" 🚗 by David BERARD (@_p0ly_) & Thomas Imbert (@masthoon)

Tweet Image 1

Mastho Reposted

Excited to share our research on Kernel Streaming! We discovered several vulnerabilities in it that we used at Pwn2Own this year. Check it out: devco.re/blog/2024/08/2…


Mastho Reposted

After nearly 10 years of existence, years of use in production on 10k+ computers. The new PythonForWindows release is 1.0.0 \o/ This release adds three important things: official python 3 support, full Unicode support for py2/py3 & CI testing on GitHub ! github.com/hakril/PythonF…


Mastho Reposted

Ticket sales for #HEXACON2024 are now OPEN! 📆 4th & 5th of October 2024 🎫 Standard price: 1210€ 🎟 Reduced price: 660€ hexacon.fr/register/


Mastho Reposted

#HEXACON2024's call for paper is officially open! 📅 29 May - Mid July ▶️ cfp.hexacon.fr/hexacon-2024/ As always, thanks again for our committee members who are willing to dedicate some of their valuable time to assess and review the submissions!

Tweet Image 1

Mastho Reposted

Registration for trainings is now open! ⏳ Don't miss your chance to learn from the best and have a great time in Paris 🥐 hexacon.fr/register/

Tweet Image 1

Mastho Reposted

The team is getting ready for the next #Pwn2Own with some good stuff, stay tuned 😉

Tweet Image 1

Just hours left to enter. See you next week!

Tweet Image 1


Mastho Reposted

Here we are! 🥷 Masters of pwn for the third time 🎉 Congratulations to all the ninjas involved! #Pwn2Own

Tweet Image 1
Tweet Image 2

Mastho Reposted

Have you ever wondered what the attack surface of Counter Strike: Global Offensive looks like? Our ninjas @myr463 and @v1csec studied it and found a server to client bug! Read more details about this research in our latest blogpost. synacktiv.com/publications/e…


Mastho Reposted

Our ninja @masthoon solved a tough challenge during @PotluckCTF with an ingenious approach: he built a decompiler for a custom ISA by lifting instructions to Binary Ninja IL. Read the "Pot of Gold" write-up (kudos to @bl4sty for creating the challenge): synacktiv.com/publications/l…


Mastho Reposted

Here is a tool that helped me looking for tricky ROP gadgets when manual search failed 🔎 Grab a Windows user-dump of your target, write a pre/post condition and let it try to emulate every candidate in the address space. github.com/0vercl0k/rp-bf…


Mastho Reposted

I contributed a task to this year's @PotluckCTF that contains an emulator for a custom ISA. one of the players actually implemented a decompiler for it by lifting to binja's IL. mind you: this is a 24h long CTF! very neat to see current tooling makes things like this feasible!

Tweet Image 1

Mastho Reposted

The details of our Tesla #pwn2own exploit chain are now public !

Slides of our latest talks during #GreHack23 and @codeblue_jp are now available on our website! synacktiv.com/ressources



Mastho Reposted

Now, @masthoon and @MajorTomSec are on stage to present their VirtualBox chain used during #Pwn2Own

Tweet Image 1

Mastho Reposted

This year, #HEXACON2023 will introduce the social event with a lightning talks session! 💡 ⏳ 5 minutes long ⛔️ No bullshit/commercials 🎠 Fun topics appreciated 🍻 Beers allowed 🫵Open to everyone Short talks submission will take place during the event

Tweet Image 1

Mastho Reposted

The writeups of our challenges are online, go check them out! 🏆 GG and thanks to the authors @nneonneo, @CyrilleChatras and mercymercy_6ft3_DOajNY 🔥 hexacon.fr/challenge/#cha


Mastho Reposted

Sometimes simple is best. See how @SidewayRE exploited a 9-year-old Linux kernel bug at #Pwn2Own Vancouver 2023! synacktiv.com/publications/o…


Mastho Reposted

Later today, @masthoon will talk at #HITB2023HKT about two bugs he exploited in Windows kernel during #Pwn2Own and how the future mitigations will make them harder to exploit (or not 😱) conference.hitb.org/hitbsecconf202…


Mastho Reposted

📦 Breaking Out of the Box: Technical analysis of VirtualBox VM escape with Windows LPE, by Thomas Bouzerar (@MajorTomSec) and Thomas Imbert (@masthoon)

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.