The fuzzer that found project-zero.issues.chromium.org/issues?q=com... (and a number of issues prior to that as well) is now open-source: crrev.com/c/7580844
It uses pkeys, trap-handling and single-stepping to intercept and mutate in-sandbox reads (see trap-fuzzer.h). Definitely had fun writing it!
Posts by Erwan Grelet
2 years ago I did a PoC to run #rust 🦀 in the #pixel modem
Today it shipped in millions of devices!
They grow up to fast! 🥲
security.googleblog.com/2026/04/brin...
#rust #security #smartphone #baseband
Tired of reversing the same libc for the 100th time? 👀
Meet SightHouse, our open-source tool that automatically detects third-party library functions in binaries.
High-confidence function mapping. Works with any disassembler. By @Mad5quirrel & Sami.
🔗 blog.quarkslab.com/sighthouse-a...
SCOOP: Someone has found new samples of the iPhone spyware DarkSword and published them on GitHub, putting millions of iOS users at risk.
A cybersecurity researcher told us that the leaked spyware is "way too easy to repurpose" and "we need to expect criminals and others to start deploying this."
The CEO of Krafton used ChatGPT to push out the head of the studio developing Subnautica 2 against the advice of his own legal team and failed miserably.
RE//verse 2026 talks are live on YouTube! Want to revisit a talk or catch the ones you missed? The full playlist is now available:
youtube.com/playlist?lis...
The recording of my talk "Challenges in Decompilation and Reverse Engineering of CUDA-based Kernels" at @re-verse.io is now online!
Recording: www.youtube.com/watch?v=ns5j...
Slides: nicolo.dev/files/pdf/re...
Binary Ninja plugin: github.com/seekbytes/pt...
RE//verse 2026 videos are online
www.youtube.com ->
Original->
Diagram titled “Transformer attention.” It shows three steps of the attention computation with code snippets beside each step. The first step is “Scale factor 1/√dₖ,” highlighting code that computes the reciprocal square root. The second step is “Dot product Q · K,” showing code performing a dot-product accumulation. The third step is “Scaling + max tracking,” highlighting code that multiplies by the scale factor, stores the value, and updates a running maximum. The phrase “Transformer attention” appears prominently in the center.
The slides from my @re-verse.io talk, "Challenges in Decompilation and Reverse Engineering of CUDA-based Kernels", are now online!
Slides: nicolo.dev/files/pdf/re...
Plugin: github.com/seekbytes/pt...
Last day before prices go up for Deconstructing Rust Binaries at Ringzer0, March 23-26! If you've been thinking about this fully remote, 16-hour Rust reverse engineering training: now is the time to book!
ringzer0.training/countermeasu...
#infosec #ReverseEngineering #rustlang #MalwareAnalysis
In the final part of his blog series, @tiraniddo.dev tells the story of how a bug was introduced into a Windows API.
Code re-writes can improve security, but it’s important not to forget the security properties the code needs to enforce in the process.
projectzero.google/2026/02/gphf...
NEW: Def Con banned hackers Pablos Holmes and Vincenzo Iozzo, as well as former MIT Media Lab director Joichi Ito, from attending the conference based on their links to Jeffrey Epstein.
Holmes and Iozzo exchanged emails with Epstein for several years.
Meta is putting a "Name Tag" feature in Ray-Bans - facial recognition through the glasses' camera. You look at someone, AI tells you who they are.
In an internal document, the company wrote that the timing is good because civil society groups are busy with politics and won't cause problems.
Hello, World! Welcome back! I have new blog :-)
tracesofhumanity.org/hello-world/
Hadn't realised that the third party review of Twitter's chat protocol had been published and wow github.com/trailofbits/...
No security feature is perfect. @tiraniddo.dev reviewed Windows’ new Administrator Protection and found several bypasses.
projectzero.google/2026/26/wind...
The RE//verse 2026 schedule is live and the lineup is stacked! Check it out:
reverse-2026.sessionize.com/schedule
Today, Project Zero released a 0-click exploit chain for the Pixel 9. While it targets the Pixel, the 0-click bug and exploit techniques we used apply to most other Android devices.
projectzero.google/2026/01/pixe...
🚨 REcon 2026 is LIVE!
🚀 Call for papers and registration are now open!
Join the world's top reverse engineers & exploit devs in Montreal:
🛠 Trainings: June 15-18
📅 Conference: June 19-21
Tickets & early bird now open → recon.cx
Limited spots – see you in MTL! #REcon2026 #ReverseEngineering
Nicolò Altamura digs into decompiling CUDA kernels at RE//verse 2026! He takes a look at how GPU execution and NVIDIA’s IRs change the usual assumptions for decompilers and shows early work on a Binary Ninja PTX plugin aimed at real CUDA reversing. Don't miss out: shop.binary.ninja/collections/...
I reverse engineered DexProtector, the security solution protecting applications like Revolut and other banking apps.
From custom ELF loaders to vtable hooking, here is an insight into how these protections work and their limitations.
www.romainthomas.fr/post/26-01-d...
Excited to bring Deconstructing Rust Binaries to NorthSec in March! Chat with me here or at @decoderloop.com if you have questions about the training.
Take advantage of the early bird rate for the onsite option! Pricing is in CAD, take advantage of the exchange rate (:
nsec.io/training/202...
We launched a redesigned Project Zero website today at projectzero.google !
To mark the occasion, we released some older posts that never quite made it out of drafts.
Enjoy!
[New blog post] As part of an R&D project, @tomtombinary.bsky.social identified several critical vulnerabilities in the LAN multiplayer mode of the game Anno 1404 (released in 2009) 🔍
Want to know more?
Read the full article on our blog 👇
www.synacktiv.com/en/publicati...
V8 now has a JS bytecode verifier!
IMO a good example for the benefits of the V8 Sandbox architecture:
- Hard: verify that bytecode is correct (no memory corruption)
- Easier: verify that it is secure (no out-of-sandbox memory corruption)
The sandbox basically separates correctness from security.
YARA fans, check out this great new @binary.ninja plugin!!!
Binary Ninja 5.2, Io, is live and it's out of this world! binary.ninja/2025/11/13/b...
With some of our most requested features of all time including bitfield support, containers, hexagon, Ghidra import, and a huge upgrade to TTD capabilities, plus a ton more, make sure to check out the changelog!
A screenshot of DiaSymbolView inspecting combase.pdb
I wanted to understand what information is available in .pdb files, so I made a tool for it 🔎🐛
Welcome DiaSymbolView - a debug symbol hierarchy and properties viewer based on MSDIA: github.com/diversenok/D...