Similar User
@reconmtl
@JonathanSalwan
@ret2systems
@Synacktiv
@elvanderb
@REhints
@RolfRolles
@0vercl0k
@mr_phrazer
@qb_triton
@rh0main
@Ivanlef0u
@fridadotre
@5aelo
@vector35
This year we were proud to sponsor @GrehackConf again! We hope you liked our talks and workshops, including an inside look at the MIFARE Classic smart card backdoor by @doegox and the upcoming Kerberos exploitation workshop by Rayan. 💪#GreHack2024
Sacre BLE! Fuzzing Bluetooth Low Energy GATT and annoying your colleagues for fun and silence Let Baptiste Boyer show you the way blog.quarkslab.com/bluetooth-low-…
Are you ready to brainstorm at #hw_ioNL2024? Organized by @quarkslab, Hardware CTF is your chance to test your knowledge, learn from fellow enthusiasts, and win amazing prices! RFID 📡 Bluetooth 📶 Automotive 🚗 3D 🖨️ (De)Soldering🔥 Radio 📻 Know More: hardwear.io/netherlands-20…
Our 2024-2025 internships season has started Check out the 3 new openings and apply for fun and knowledge! (paid internships, fur coats not included) blog.quarkslab.com/internship-off…
Linux kernel instrumentation from Qemu and gdb: A technique to analyze binaries or kernel modules that may try to monitor themselves. In this blog post Professor @Mad5quirrel explains the trick blog.quarkslab.com/linux-kernel-i…
We are proud to sponsor the 1st edition of the HackHer Challenge, a CTF competition dedicated to female students and professionals, with the mission of promoting diversity. This Saturday October 19th 10:00 to 18:00 Details and registration here: hackher-challenge.com
Finding and chaining 4 vulns to exfiltrate encryption keys from the Android Keystore on Samsung series A* devices. Did you miss the "Attacking the Samsung Galaxy A* Boot Chain" talk by @max_r_b and Raphaël Neveu earlier this year ? Talk && PoC || GTFO: blog.quarkslab.com/attacking-the-…
Don't you miss the golden era of SQL injections? Here Mathieu Farrell (@coiffeur0x90) explains how to feel the thrill again with the aid of Apache Superset, XML and a bit of parsing tickery: "Bypass Apache Superset restrictions to perform SQL injections" blog.quarkslab.com/bypass-apache-…
Mathieu Farrell (@coiffeur0x90) discovered a dylib injection vulnerability in Microsoft Teams on MacOS. The bug allows an attacker to secretly spy on users through their microphone and camera. Here he explains how he identified and exploited it: blog.quarkslab.com/exploiting-mic…
The Cryptodifference Engine: An in-depth look at differential fuzzing for harvesting crypto bugs, by Célian Glénaz blog.quarkslab.com/differential-f…
📢 Final of the C&ESAR by DGA: Places are limited 😉! Philippe Teuwen from @quarkslab will discuss vulnerabilities in some MIFARE Classic cards, shedding light on some current hardware supply chain concerns. 👉 european-cyber-week.eu/inscriptions
Dive into crypto-condor, our open-source test suite for cryptographic primitives by Julio Loayza Meneses! Perfect for ensuring compliance & correctness in your implementations. Let's secure your cryptography together! blog.quarkslab.com/crypto-condor-… #cryptography
Chamilo is an open source e-Learning platform written in PHP and used worldwide. During a red team engagement Quarkslab's engineer Mathieu Farrell learned how to exploit it for Remote Code Execution. Now you can too: blog.quarkslab.com/exploiting-cha…
Operator Fabric is an open source platform built by the @LFE_Foundation for use in electricity, water and other utility operations Last May we did a security audit sponsored by @OSTIFofficial🙏 Read a summary of our findings and find the full report here: blog.quarkslab.com/audit-of-opera…
Come to see our automotive security expert @phil_barr3tt on stage at @_barbhack_, twice! As proud sponsors, we have a couple of tickets to offer. You are student? Send us a small motivated email to contact at quarkslab com before tomorrow 15:00 CEST and we'll make a choice.
In June 2024, Quarkslab engineers Turt and @zigtur audited the DeFi product developed by Airswift that "optimizes funds flow" between buyers and suppliers. We would like to thank the Stellar Development Foundation for supporting this project. Report here: blog.quarkslab.com/airswift-scf-s…
Chinese Backdoor Alert! Security enhancements on Mifare Classic cards used in hotels/business contain a supply chain backdoor making reading & exploitation trivial. Great paper by Philippe Teuwen Quarkslab eprint.iacr.org/2024/1275.pdf Watch your Chinese supply chains carefully folks!
Are "MIFARE-compatible" contactless cards not playing fair? That's what you may wonder after @doegox spotted some odd behavior. Curiosity led to experiments to devise a new attack technique that uncovered some backdoors. The RFID hacking spirit lives on! blog.quarkslab.com/mifare-classic…
United States Trends
- 1. Tyson 515 B posts
- 2. Karoline Leavitt 20,5 B posts
- 3. Paige 8.141 posts
- 4. #wompwomp 7.179 posts
- 5. Syracuse 23 B posts
- 6. Pence 62,9 B posts
- 7. Kash 109 B posts
- 8. Kiyan 27,8 B posts
- 9. The FBI 277 B posts
- 10. Frankie Collins N/A
- 11. Debbie 36,2 B posts
- 12. Jarry N/A
- 13. Whoopi 119 B posts
- 14. #TOKKIVSWORLD 1.971 posts
- 15. #LetsBONK 16,8 B posts
- 16. Dora 25,1 B posts
- 17. Juanfer 5.892 posts
- 18. White House Press Secretary 23,9 B posts
- 19. End of 1 23,9 B posts
- 20. Ace Bailey N/A
Who to follow
-
REcon
@reconmtl -
Jonathan Salwan
@JonathanSalwan -
RET2 Systems
@ret2systems -
Synacktiv
@Synacktiv -
Eloi Benoist-Vanderbeken
@elvanderb -
REhints
@REhints -
Rolf Rolles
@RolfRolles -
Axel Souchet
@0vercl0k -
Tim Blazytko
@mr_phrazer -
The Triton library
@qb_triton -
Romain THOMAS
@rh0main -
`Ivan
@Ivanlef0u -
Frida
@fridadotre -
Samuel Groß
@5aelo -
Vector 35
@vector35
Something went wrong.
Something went wrong.