Advertisement · 728 × 90

Posts by Erwan Grelet

Project Zero

The fuzzer that found project-zero.issues.chromium.org/issues?q=com... (and a number of issues prior to that as well) is now open-source: crrev.com/c/7580844

It uses pkeys, trap-handling and single-stepping to intercept and mutate in-sandbox reads (see trap-fuzzer.h). Definitely had fun writing it!

1 day ago 8 3 0 0
Preview
Bringing Rust to the Pixel Baseband Posted by Jiacheng Lu, Software Engineer, Google Pixel Team Google is continuously advancing the security of Pixel devices. We have been f...

2 years ago I did a PoC to run #rust 🦀 in the #pixel modem

Today it shipped in millions of devices!

They grow up to fast! 🥲

security.googleblog.com/2026/04/brin...

#rust #security #smartphone #baseband

1 week ago 98 17 5 1
Post image

Tired of reversing the same libc for the 100th time? 👀

Meet SightHouse, our open-source tool that automatically detects third-party library functions in binaries.
High-confidence function mapping. Works with any disassembler. By @Mad5quirrel & Sami.

🔗 blog.quarkslab.com/sighthouse-a...

2 weeks ago 3 2 0 0
Preview
Someone has publicly leaked an exploit kit that can hack millions of iPhones | TechCrunch Leaked "DarkSword" exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions of iOS with spyware, according to cybersecurity researchers.

SCOOP: Someone has found new samples of the iPhone spyware DarkSword and published them on GitHub, putting millions of iOS users at risk.

A cybersecurity researcher told us that the leaked spyware is "way too easy to repurpose" and "we need to expect criminals and others to start deploying this."

4 weeks ago 105 81 7 16
Preview
CEO Ignores Lawyers, Asks ChatGPT How to Void $250 Million Contract, Loses Terribly in Court The CEO of Krafton used ChatGPT to push out the head of the studio developing Subnautica 2 against the advice of his own legal team and failed miserably.

The CEO of Krafton used ChatGPT to push out the head of the studio developing Subnautica 2 against the advice of his own legal team and failed miserably.

1 month ago 599 231 17 25
Post image

RE//verse 2026 talks are live on YouTube! Want to revisit a talk or catch the ones you missed? The full playlist is now available:
youtube.com/playlist?lis...

1 month ago 8 4 0 0
Preview
GitHub - seekbytes/ptxNinja: Binary Ninja plugin for reverse engineering PTX -- the virtual instruction set architecture of CUDA-based GPUs. Binary Ninja plugin for reverse engineering PTX -- the virtual instruction set architecture of CUDA-based GPUs. - seekbytes/ptxNinja

The recording of my talk "Challenges in Decompilation and Reverse Engineering of CUDA-based Kernels" at @re-verse.io is now online!

Recording: www.youtube.com/watch?v=ns5j...

Slides: nicolo.dev/files/pdf/re...

Binary Ninja plugin: github.com/seekbytes/pt...

1 month ago 0 3 0 0

RE//verse 2026 videos are online


www.youtube.com ->


Original->

1 month ago 2 3 0 0
Advertisement
Diagram titled “Transformer attention.” It shows three steps of the attention computation with code snippets beside each step. The first step is “Scale factor 1/√dₖ,” highlighting code that computes the reciprocal square root. The second step is “Dot product Q · K,” showing code performing a dot-product accumulation. The third step is “Scaling + max tracking,” highlighting code that multiplies by the scale factor, stores the value, and updates a running maximum. The phrase “Transformer attention” appears prominently in the center.

Diagram titled “Transformer attention.” It shows three steps of the attention computation with code snippets beside each step. The first step is “Scale factor 1/√dₖ,” highlighting code that computes the reciprocal square root. The second step is “Dot product Q · K,” showing code performing a dot-product accumulation. The third step is “Scaling + max tracking,” highlighting code that multiplies by the scale factor, stores the value, and updates a running maximum. The phrase “Transformer attention” appears prominently in the center.

The slides from my @re-verse.io talk, "Challenges in Decompilation and Reverse Engineering of CUDA-based Kernels", are now online!

Slides: nicolo.dev/files/pdf/re...

Plugin: github.com/seekbytes/pt...

1 month ago 6 2 1 0
Preview
Deconstructing Rust Binaries Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practical…

Last day before prices go up for Deconstructing Rust Binaries at Ringzer0, March 23-26! If you've been thinking about this fully remote, 16-hour Rust reverse engineering training: now is the time to book!

ringzer0.training/countermeasu...

#infosec #ReverseEngineering #rustlang #MalwareAnalysis

1 month ago 4 3 0 0
A Deep Dive into the GetProcessHandleFromHwnd API - Project Zero In my previous blog post I mentioned the GetProcessHandleFromHwnd API. This was an API I didn’t know existed until I found a publicly disclosed UAC bypass us...

In the final part of his blog series, @tiraniddo.dev tells the story of how a bug was introduced into a Windows API.

Code re-writes can improve security, but it’s important not to forget the security properties the code needs to enforce in the process.

projectzero.google/2026/02/gphf...

1 month ago 5 4 0 0
Preview
Hacking conference Def Con bans three people linked to Epstein | TechCrunch The Def Con hacking conference banned hackers Pablos Holman and Vincenzo Iozzo, as well as former MIT Media Lab director Joichi Ito, from attending the annual conference after their reported connectio...

NEW: Def Con banned hackers Pablos Holmes and Vincenzo Iozzo, as well as former MIT Media Lab director Joichi Ito, from attending the conference based on their links to Jeffrey Epstein.

Holmes and Iozzo exchanged emails with Epstein for several years.

2 months ago 114 36 3 4
Post image

Meta is putting a "Name Tag" feature in Ray-Bans - facial recognition through the glasses' camera. You look at someone, AI tells you who they are.
In an internal document, the company wrote that the timing is good because civil society groups are busy with politics and won't cause problems.

2 months ago 1219 755 34 149

Hello, World! Welcome back! I have new blog :-)

tracesofhumanity.org/hello-world/

2 months ago 25 5 5 0

Hadn't realised that the third party review of Twitter's chat protocol had been published and wow github.com/trailofbits/...

2 months ago 116 35 2 5
Advertisement
Bypassing Windows Administrator Protection - Project Zero A headline feature introduced in the latest release of Windows 11, 25H2 is Administrator Protection. The goal of this feature is to replace User Account Cont...

No security feature is perfect. @tiraniddo.dev reviewed Windows’ new Administrator Protection and found several bypasses.

projectzero.google/2026/26/wind...

2 months ago 5 5 0 0
Preview
RE//verse 2026 Schedule

The RE//verse 2026 schedule is live and the lineup is stacked! Check it out:
reverse-2026.sessionize.com/schedule

3 months ago 4 3 0 0
A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby - Project Zero Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One ef...

Today, Project Zero released a 0-click exploit chain for the Pixel 9. While it targets the Pixel, the 0-click bug and exploit techniques we used apply to most other Android devices.

projectzero.google/2026/01/pixe...

3 months ago 58 35 1 2
REcon 2026 - Premier Reverse Engineering Conference REcon 2026 - Premier reverse engineering and cybersecurity conference in Montreal

🚨 REcon 2026 is LIVE!
🚀 Call for papers and registration are now open!

Join the world's top reverse engineers & exploit devs in Montreal:
🛠 Trainings: June 15-18
📅 Conference: June 19-21
Tickets & early bird now open → recon.cx

Limited spots – see you in MTL! #REcon2026 #ReverseEngineering

3 months ago 8 3 0 2
Post image

Nicolò Altamura digs into decompiling CUDA kernels at RE//verse 2026! He takes a look at how GPU execution and NVIDIA’s IRs change the usual assumptions for decompilers and shows early work on a Binary Ninja PTX plugin aimed at real CUDA reversing. Don't miss out: shop.binary.ninja/collections/...

3 months ago 3 1 0 1
Preview
A Glimpse Into DexProtector | Romain Thomas This blog post provides a high-level overview of DexProtector's security features and their limitations

I reverse engineered DexProtector, the security solution protecting applications like Revolut and other banking apps.

From custom ELF loaders to vtable hooking, here is an insight into how these protections work and their limitations.

www.romainthomas.fr/post/26-01-d...

3 months ago 34 12 0 0

Excited to bring Deconstructing Rust Binaries to NorthSec in March! Chat with me here or at @decoderloop.com if you have questions about the training.

Take advantage of the early bird rate for the onsite option! Pricing is in CAD, take advantage of the exchange rate (:

nsec.io/training/202...

4 months ago 5 3 0 0
Google Project Zero Make zeroday hard

We launched a redesigned Project Zero website today at projectzero.google !

To mark the occasion, we released some older posts that never quite made it out of drafts.

Enjoy!

4 months ago 18 4 0 1
Advertisement
Preview
It just keeps getting worse - Firefox to "evolve into a modern AI browser " Just like Google plan with Chrome, Mozilla aren't sitting still on expanding Firefox into something resembling a web browser but with more AI.

It just keeps getting worse - Firefox to "evolve into a modern AI browser "
#AI #Mozilla #Firefox

4 months ago 1542 477 187 995
Preview
Exploiting Anno 1404 Exploiting Anno 1404

[New blog post] As part of an R&D project, @tomtombinary.bsky.social identified several critical vulnerabilities in the LAN multiplayer mode of the game Anno 1404 (released in 2009) 🔍

Want to know more?
Read the full article on our blog 👇
www.synacktiv.com/en/publicati...

4 months ago 3 3 0 0

V8 now has a JS bytecode verifier!

IMO a good example for the benefits of the V8 Sandbox architecture:
- Hard: verify that bytecode is correct (no memory corruption)
- Easier: verify that it is secure (no out-of-sandbox memory corruption)

The sandbox basically separates correctness from security.

4 months ago 20 4 1 0

YARA fans, check out this great new @binary.ninja plugin!!!

4 months ago 3 1 0 0
Preview
GrapheneOS bails on OVHcloud over France's privacy stance Project cites fears of state access as cloud sovereignty row deepens French cloud outfit OVHcloud took another hit this week after GrapheneOS, a mobile operating system, said it was ditching the company's servers over concerns about France's approach to digital privacy.…

GrapheneOS bails on OVHcloud over France's privacy stance

4 months ago 55 20 5 6
Post image

Binary Ninja 5.2, Io, is live and it's out of this world! binary.ninja/2025/11/13/b...

With some of our most requested features of all time including bitfield support, containers, hexagon, Ghidra import, and a huge upgrade to TTD capabilities, plus a ton more, make sure to check out the changelog!

5 months ago 9 3 1 0
A screenshot of DiaSymbolView inspecting combase.pdb

A screenshot of DiaSymbolView inspecting combase.pdb

I wanted to understand what information is available in .pdb files, so I made a tool for it 🔎🐛

Welcome DiaSymbolView - a debug symbol hierarchy and properties viewer based on MSDIA: github.com/diversenok/D...

5 months ago 10 4 1 0
Advertisement