Advertisement ยท 728 ร— 90

Posts by Quarkslab

I fought the LLVM and I lost

I fought the LLVM and I lost

Obfuscation vs The Optimizer: A Battle in LLVM Middle End.

Robert Yates shows us how the continuous improvement of the LLVM optimizer defeats naive code obfuscation, and how the obfuscator can fight back.

An eternal fight in which all victories are ephemeral

blog.quarkslab.com/obfuscation-...

3 days ago 0 0 0 0
Rerversering of all the NSA things!

Rerversering of all the NSA things!

๐Ÿค”Ever wondered how your favorite tools work under the hood? During our work on SightHouse, we dug into BSIM, Ghidra's Binary function SIMilarity engine.

Many tools have been built around it, yet its internals remained undocumented. Until now ๐Ÿ‘‡
blog.quarkslab.com/bsim-explain...

5 days ago 1 1 0 0
yep, it is a car and a TCU, and yes, it is AI generated. Sorry.

yep, it is a car and a TCU, and yes, it is AI generated. Sorry.

๐Ÿš— We traced a carโ€™s life from China to Poland.
By analyzing a BYD Telematic Control Unit, Romain Marchand econstructed its journey and identified a real-world event from GPS logs alone.
Embedded forensics + OSINT = real stories hidden in data.
๐Ÿ‘‰ blog.quarkslab.com/tearing-down...

1 week ago 2 0 0 0
Post image

After Mathieu Farrell found 3 LPEs in Intego antivirus for macOS, Lucas Laise had to check the Windows version too.
Spoiler: it was vulnerable.
Here's the full write up of a symlink attack to achieve Local Privilege Escalation๐Ÿ‘‡
blog.quarkslab.com/milking-the-...

1 week ago 1 0 0 0
Post image

Tired of reversing the same libc for the 100th time? ๐Ÿ‘€

Meet SightHouse, our open-source tool that automatically detects third-party library functions in binaries.
High-confidence function mapping. Works with any disassembler. By @Mad5quirrel & Sami.

๐Ÿ”— blog.quarkslab.com/sighthouse-a...

2 weeks ago 3 2 0 0
Post image

The dragon has a VM. Of course it does.

Our latest blog walks through the analysis of a complex C++ binary hiding behind a virtual machine, themed as a classic RPG fight.
QBDI & TritonDSE are your weapons of choice. The dragon doesn't stand a chance. ๐Ÿ‰

๐Ÿ”— blog.quarkslab.com/qbdi-vs-trit...

2 weeks ago 0 1 0 0
Post image

Rule 1๏ธโƒฃ : "In WAF we (should not) trust"

Your WAF is doing its best. That's just not enough ๐Ÿ˜ฎโ€๐Ÿ’จ
A deep dive into Web Application Firewall bypass techniques, discovering why blocked โ›” doesn't always mean safe.

blog.quarkslab.com/in-waf-we-sh...

3 weeks ago 1 0 0 0
Advertisement
Too many skulls

Too many skulls

"Intego X9: Never trust my updates"

Read Mathieu Farrell's research showing how XPC interprocess communications and the update mechanism of the Intego antivirus for MacOS can be abused for local privilege escalation.

blog.quarkslab.com/intego_lpe_m...

4 weeks ago 0 0 0 0
Look Ma, no sensors!

Look Ma, no sensors!

"How does it even work?"
The question that keeps hackers' hearts pumping, blood pressure rising, and curiosity growing.
This is Damien Cauquil's reverse engineering journey into a cheap smartwatch that measures at least one of those.
blog.quarkslab.com/nerd-life-we...

1 month ago 1 1 0 0
What if I flip this little thingie?

What if I flip this little thingie?

One bit flip to corrupt it all: Exploitation of an old Linux kernel vulnerability using PageJack, a modern technique to create Use After Free bugs.
Here Jean Vincent shows you how
blog.quarkslab.com/pagejack-in-...

1 month ago 1 0 0 0
Post image

If you glitch one, can you glitch many?
Extracting automotive firmware is a challenge.
@phil-barr3tt.bsky.social explains how he bypassed the IDCODE protection in several variants of the RH850 MCU family using both voltage glitching and side-channel analysis โšก๏ธ๐Ÿš—
blog.quarkslab.com/bypassing-de...

1 month ago 1 2 0 0
Post image

Reverse engineers often spend a lot of time deciphering third-party firmware libraries. At RE//verse 2026 (Fri, 5 PM), Benoit & Sami will introduce SightHouse, an open-source tool to automatically identify third-party functions and speed up analysis.
Join us!

1 month ago 3 2 0 0
Post image

Another antivirus ๐Ÿ›ก๏ธ, another unfulfilled promise ๐Ÿ˜ฃ. @kaluche_ turns Avira's protection into a privilege escalation playground. This time: 3 LPE vectors ๐Ÿ†™ via symlink abuse (CVE-2026-27748, CVE-2026-27750) and unsafe deserialization (CVE-2026-27749).

Find out more: blog.quarkslab.com/avira-deseri...

1 month ago 4 1 1 0
Post image

Why macOS AVs shouldnโ€™t trust PIDs ๐Ÿ˜„๐Ÿ - new post by @Coiffeur0x90

Intego X9: XPC validation falls back to PID โ†’ PID reuse + posix_spawn() shenanigans ๐Ÿ˜ โ‡’ confused deputy / privileged methods abused ๐Ÿคก๐Ÿงจ

Lesson: PID โ‰  identity.
Check it out ๐Ÿ”— blog.quarkslab.com/intego_lpe_m...

1 month ago 0 0 0 0
Remember whnn you didnt need an AV on your Mac? It was today

Remember whnn you didnt need an AV on your Mac? It was today

You've never been more right to doubt your MacOS antivirus software ๐Ÿ˜ฅ
Our latest research by Mathieu Farrell shows how Intego can be abused for Local Privilege Escalation
Yes, the antivirus.
Yes, as root.
blog.quarkslab.com/intego_lpe_m...

2 months ago 1 0 0 0
Advertisement
Java is bomb you ride backwards

Java is bomb you ride backwards

"Dr. Bytecode or: How I Learned to Stop Worrying and Obfuscate Java"

A tale about how @farena.in started his journey in Java software obfuscation.

blog.quarkslab.com/how-to-write...

2 months ago 3 1 0 0
Post image

"Use a better system prompt" is the new "sanitize your inputs", but when your #AI agent's tools don't check permissions, you've got a problem and no amount of prompting will fix it.
Check Kaluche's blog post about #AgenticAI & the Confused Deputy issue โฌ‡๏ธ
blog.quarkslab.com/agentic-ai-t...

2 months ago 0 0 0 0
Post image

@lfenergy.bsky.social EVerest underwent a security engagement facilitated by us with auditing by @quarkslab.bsky.social. This holistic security work impacts millions of EV charging stations worldwide. Read more at our blog:
ostif.org/everest-secu...

2 months ago 1 1 0 0
Post image

We conducted the first public third-party security assessment of EVerest, an open-source firmware stack for electric vehicle charging stations, deployed in hundreds of thousands of charging points worldwide.
The audit was mandated by @ostifofficial.bsky.social ๐Ÿ™

blog.quarkslab.com/everest-secu...

2 months ago 2 2 0 0
Post image

A decade is an eternity in security. ๐Ÿ›ก๏ธ
Ten years ago, we released the Clang Hardening Cheat Sheet. Today, the landscape has changed. @0xTRIKKSS & @bcreusillet break down the latest mitigations to keep your code secure.
๐Ÿ”—Read the update: blog.quarkslab.com/clang-harden...

3 months ago 4 4 0 0
Post image

A modern tale of Blinkenlights, cheap Christmas shopping and curiosity, narrated by Damien Cauquil

Firmware extraction and reverse engineering of a smartwatch FTW!

blog.quarkslab.com/modern-tale-...

4 months ago 1 0 0 0
โ€‹๐Ÿ–ฅ๏ธโ€‹ cesi n'est pas une named pipe

โ€‹๐Ÿ–ฅ๏ธโ€‹ cesi n'est pas une named pipe

K7 Antivirus: Named pipe abuse, registry manipulation and privilege escalation.
A story of endpoint post-exploitation by Lucas Laise

blog.quarkslab.com/k7-antivirus...

4 months ago 3 0 0 0
Advertisement
Bitcoin Core Audit Complete! โ€“ OSTIF.org

We've been a bit excited about this one.
We are excited and honored to have partnered with Bitcoin, brink, Chaincode Labs, and @quarkslab.bsky.social to collaborate on a security audit of Bitcoin Core. This was Bitcoin Core's first external audit.
Read more at our blog: ostif.org/bitcoin-core...

5 months ago 5 2 1 0
Bitcoin Core audit - Quarkslab's blog The Open Source Technology Improvement Fund, Inc. mandated Quarkslab to perform the first public security audit of Bitcoin core, the reference open-source implementation of the Bitcoin decentralized p...

Quarkslab engineers Robin David, Mihail Kirov and Kaname just completed the first public security audit of Bitcoin Core, led by
@ostifofficial.bsky.social and funded by Brink.dev

Details on the blog post:
blog.quarkslab.com/bitcoin-core...
Congrats to developers for such software masterpiece !

5 months ago 6 5 0 0
Preview
Announcing the results of our Security Audit | KubeVirt.io As part of our application to Graduate, KubeVirt has a security audit performed by a third-party, organised through the CNCF and OSTIF.

We are pleased to announce that the KubeVirt Security Audit report has been published, in collaboration with @quarkslab.bsky.social and @ostifofficial.bsky.social

Check out our blog post for all the details: kubevirt.io/2025/Announc...

5 months ago 4 3 0 0
Post image

KubeVirt is open source virtualization technology for Kubernetes.
Recently we worked with the @kubevirt team on a security audit sponsored by @OSTIFofficial ๐Ÿ™

Read a summary of our findings and find the full report here:
blog.quarkslab.com/kubevirt-sec...

5 months ago 1 1 0 0
Post image

Our 2025-2026 internship season has started.
Check out the list of openings and apply for fun and knowledge!

blog.quarkslab.com/internship-offers-for-the-2025-2026-season.html

5 months ago 3 3 0 0
Oops! It's a kernel stack use-after-free: Exploiting NVIDIA's GPU Linux drivers - Quarkslab's blog This article details two bugs discovered in the NVIDIA Linux Open GPU Kernel Modules and demonstrates how they can be exploited. The bugs can be triggered by an attacker controlling a local unprivileg...

From kernel oops to kernel exploit: How two little bugs (CVE-2025-23330, CVE-2025-23280) in #NVIDIA open GPU #Linux driver can lead to full system compromise.

Full technical breakdown inside, #vmalloc exploitation technique included!

blog.quarkslab.com/nvidia_gpu_k...

6 months ago 2 2 0 1
Unsigned FTW!

Unsigned FTW!

Finding a buggy driver is one thing, abusing it is another๐Ÿง 
In his latest blog post, Luis Casvella shows you how BYOVD can be used as a Reflective Rootkit Loader ! ๐Ÿš€

โžก๏ธ blog.quarkslab.com/exploiting-l...

6 months ago 3 2 0 1
Signal: Yo dawg! I heard you liked ratchets, so we added a ratchet to our Double Ratchet.

Signal: Yo dawg! I heard you liked ratchets, so we added a ratchet to our Double Ratchet.

Quantum computers are not quite here yet, but now's the time to get ready. After updating their protocol in 2023, @signal.org is now proposing a post-quantum version of their Double Ratchet for message encryption.

Let's see what Signal looks like now!
blog.quarkslab.com/triple-threa...

6 months ago 5 3 0 1