Quarkslab
@quarkslab.bsky.social
📤 304
📥 3
📝 57
Securing every bit of your data
https://quarkslab.com
pinned post!
Our 2025-2026 internship season has started. Check out the list of openings and apply for fun and knowledge!
blog.quarkslab.com/internship-offers-for-the-2025-2026-season.html
6 months ago
0
3
3
Do you know how Entra ID applications work? What about the security mess they can bring and what they can quietly break? New blog post on Entra ID application permissions, the audit nightmare they create, and QAZPT, our OSS tool to actually make sense of it:
blog.quarkslab.com/auditing-app...
2 days ago
0
0
0
Obfuscation vs The Optimizer: A Battle in LLVM Middle End. Robert Yates shows us how the continuous improvement of the LLVM optimizer defeats naive code obfuscation, and how the obfuscator can fight back. An eternal fight in which all victories are ephemeral
blog.quarkslab.com/obfuscation-...
16 days ago
0
0
0
🤔Ever wondered how your favorite tools work under the hood? During our work on SightHouse, we dug into BSIM, Ghidra's Binary function SIMilarity engine. Many tools have been built around it, yet its internals remained undocumented. Until now 👇
blog.quarkslab.com/bsim-explain...
18 days ago
0
1
1
🚗 We traced a car’s life from China to Poland. By analyzing a BYD Telematic Control Unit, Romain Marchand econstructed its journey and identified a real-world event from GPS logs alone. Embedded forensics + OSINT = real stories hidden in data. 👉
blog.quarkslab.com/tearing-down...
23 days ago
0
2
0
After Mathieu Farrell found 3 LPEs in Intego antivirus for macOS, Lucas Laise had to check the Windows version too. Spoiler: it was vulnerable. Here's the full write up of a symlink attack to achieve Local Privilege Escalation👇
blog.quarkslab.com/milking-the-...
25 days ago
0
1
0
Tired of reversing the same libc for the 100th time? 👀 Meet SightHouse, our open-source tool that automatically detects third-party library functions in binaries. High-confidence function mapping. Works with any disassembler. By @Mad5quirrel & Sami. 🔗
blog.quarkslab.com/sighthouse-a...
29 days ago
0
3
2
The dragon has a VM. Of course it does. Our latest blog walks through the analysis of a complex C++ binary hiding behind a virtual machine, themed as a classic RPG fight. QBDI & TritonDSE are your weapons of choice. The dragon doesn't stand a chance. 🐉 🔗
blog.quarkslab.com/qbdi-vs-trit...
about 1 month ago
0
0
1
Rule 1️⃣ : "In WAF we (should not) trust" Your WAF is doing its best. That's just not enough 😮💨 A deep dive into Web Application Firewall bypass techniques, discovering why blocked ⛔ doesn't always mean safe.
blog.quarkslab.com/in-waf-we-sh...
about 1 month ago
0
1
0
"Intego X9: Never trust my updates" Read Mathieu Farrell's research showing how XPC interprocess communications and the update mechanism of the Intego antivirus for MacOS can be abused for local privilege escalation.
blog.quarkslab.com/intego_lpe_m...
about 1 month ago
0
0
0
"How does it even work?" The question that keeps hackers' hearts pumping, blood pressure rising, and curiosity growing. This is Damien Cauquil's reverse engineering journey into a cheap smartwatch that measures at least one of those.
blog.quarkslab.com/nerd-life-we...
about 2 months ago
0
1
1
One bit flip to corrupt it all: Exploitation of an old Linux kernel vulnerability using PageJack, a modern technique to create Use After Free bugs. Here Jean Vincent shows you how
blog.quarkslab.com/pagejack-in-...
about 2 months ago
0
1
0
If you glitch one, can you glitch many? Extracting automotive firmware is a challenge.
@phil-barr3tt.bsky.social
explains how he bypassed the IDCODE protection in several variants of the RH850 MCU family using both voltage glitching and side-channel analysis ⚡️🚗
blog.quarkslab.com/bypassing-de...
about 2 months ago
0
1
2
Reverse engineers often spend a lot of time deciphering third-party firmware libraries. At RE//verse 2026 (Fri, 5 PM), Benoit & Sami will introduce SightHouse, an open-source tool to automatically identify third-party functions and speed up analysis. Join us!
about 2 months ago
0
3
2
Another antivirus 🛡️, another unfulfilled promise 😣. @kaluche_ turns Avira's protection into a privilege escalation playground. This time: 3 LPE vectors 🆙 via symlink abuse (CVE-2026-27748, CVE-2026-27750) and unsafe deserialization (CVE-2026-27749). Find out more:
blog.quarkslab.com/avira-deseri...
2 months ago
1
4
1
Why macOS AVs shouldn’t trust PIDs 😄🍏 - new post by @Coiffeur0x90 Intego X9: XPC validation falls back to PID → PID reuse + posix_spawn() shenanigans 😏 ⇒ confused deputy / privileged methods abused 🤡🧨 Lesson: PID ≠ identity. Check it out 🔗
blog.quarkslab.com/intego_lpe_m...
2 months ago
0
0
0
You've never been more right to doubt your MacOS antivirus software 😥 Our latest research by Mathieu Farrell shows how Intego can be abused for Local Privilege Escalation Yes, the antivirus. Yes, as root.
blog.quarkslab.com/intego_lpe_m...
3 months ago
0
1
0
"Dr. Bytecode or: How I Learned to Stop Worrying and Obfuscate Java" A tale about how
@farena.in
started his journey in Java software obfuscation.
blog.quarkslab.com/how-to-write...
3 months ago
0
3
1
"Use a better system prompt" is the new "sanitize your inputs", but when your
#AI
agent's tools don't check permissions, you've got a problem and no amount of prompting will fix it. Check Kaluche's blog post about
#AgenticAI
& the Confused Deputy issue ⬇️
blog.quarkslab.com/agentic-ai-t...
3 months ago
0
0
0
reposted by
Quarkslab
3 months ago
@lfenergy.bsky.social
EVerest underwent a security engagement facilitated by us with auditing by
@quarkslab.bsky.social
. This holistic security work impacts millions of EV charging stations worldwide. Read more at our blog:
ostif.org/everest-secu...
0
1
1
We conducted the first public third-party security assessment of EVerest, an open-source firmware stack for electric vehicle charging stations, deployed in hundreds of thousands of charging points worldwide. The audit was mandated by
@ostifofficial.bsky.social
🙏
blog.quarkslab.com/everest-secu...
3 months ago
0
2
2
A decade is an eternity in security. 🛡️ Ten years ago, we released the Clang Hardening Cheat Sheet. Today, the landscape has changed. @0xTRIKKSS & @bcreusillet break down the latest mitigations to keep your code secure. 🔗Read the update:
blog.quarkslab.com/clang-harden...
4 months ago
0
4
4
A modern tale of Blinkenlights, cheap Christmas shopping and curiosity, narrated by Damien Cauquil Firmware extraction and reverse engineering of a smartwatch FTW!
blog.quarkslab.com/modern-tale-...
5 months ago
0
1
0
K7 Antivirus: Named pipe abuse, registry manipulation and privilege escalation. A story of endpoint post-exploitation by Lucas Laise
blog.quarkslab.com/k7-antivirus...
5 months ago
0
3
0
reposted by
Quarkslab
5 months ago
We've been a bit excited about this one. We are excited and honored to have partnered with Bitcoin, brink, Chaincode Labs, and
@quarkslab.bsky.social
to collaborate on a security audit of Bitcoin Core. This was Bitcoin Core's first external audit. Read more at our blog:
ostif.org/bitcoin-core...
loading . . .
Bitcoin Core Audit Complete! – OSTIF.org
https://ostif.org/bitcoin-core-audit-complete/
1
5
2
Quarkslab engineers Robin David, Mihail Kirov and Kaname just completed the first public security audit of Bitcoin Core, led by
@ostifofficial.bsky.social
and funded by
Brink.dev
Details on the blog post:
blog.quarkslab.com/bitcoin-core...
Congrats to developers for such software masterpiece !
loading . . .
Bitcoin Core audit - Quarkslab's blog
The Open Source Technology Improvement Fund, Inc. mandated Quarkslab to perform the first public security audit of Bitcoin core, the reference open-source implementation of the Bitcoin decentralized p...
https://blog.quarkslab.com/bitcoin-core-audit.html
5 months ago
0
6
5
reposted by
Quarkslab
KubeVirt
6 months ago
We are pleased to announce that the KubeVirt Security Audit report has been published, in collaboration with
@quarkslab.bsky.social
and
@ostifofficial.bsky.social
Check out our blog post for all the details:
kubevirt.io/2025/Announc...
loading . . .
Announcing the results of our Security Audit | KubeVirt.io
As part of our application to Graduate, KubeVirt has a security audit performed by a third-party, organised through the CNCF and OSTIF.
https://kubevirt.io/2025/Announcing-KubeVirt-Security-Audit-Results.html
0
4
3
KubeVirt is open source virtualization technology for Kubernetes. Recently we worked with the @kubevirt team on a security audit sponsored by @OSTIFofficial 🙏 Read a summary of our findings and find the full report here:
blog.quarkslab.com/kubevirt-sec...
6 months ago
0
1
1
Our 2025-2026 internship season has started. Check out the list of openings and apply for fun and knowledge!
blog.quarkslab.com/internship-offers-for-the-2025-2026-season.html
6 months ago
0
3
3
From kernel oops to kernel exploit: How two little bugs (CVE-2025-23330, CVE-2025-23280) in
#NVIDIA
open GPU
#Linux
driver can lead to full system compromise. Full technical breakdown inside,
#vmalloc
exploitation technique included!
blog.quarkslab.com/nvidia_gpu_k...
loading . . .
Oops! It's a kernel stack use-after-free: Exploiting NVIDIA's GPU Linux drivers - Quarkslab's blog
This article details two bugs discovered in the NVIDIA Linux Open GPU Kernel Modules and demonstrates how they can be exploited. The bugs can be triggered by an attacker controlling a local unprivileg...
https://blog.quarkslab.com/nvidia_gpu_kernel_vmalloc_exploit.html
7 months ago
0
2
3
Finding a buggy driver is one thing, abusing it is another🧠 In his latest blog post, Luis Casvella shows you how BYOVD can be used as a Reflective Rootkit Loader ! 🚀 ➡️
blog.quarkslab.com/exploiting-l...
7 months ago
0
3
3
Quantum computers are not quite here yet, but now's the time to get ready. After updating their protocol in 2023,
@signal.org
is now proposing a post-quantum version of their Double Ratchet for message encryption. Let's see what Signal looks like now!
blog.quarkslab.com/triple-threa...
7 months ago
0
5
4
reposted by
Quarkslab
Fabrice Rossi
7 months ago
Brand new paper with Roxane Cohen, Robin David (both from
@quarkslab.bsky.social
) and Florian Yger on obfuscation detection in binary code
doi.org/10.1007/s411...
We show that carefully selected features can be leveraged by graph neural networks to outperform classical solutions.
loading . . .
Identifying obfuscated code through graph-based semantic analysis of binary code - Applied Network Science
Protecting sensitive program content is a critical concern in various situations, ranging from legitimate use cases to unethical contexts. Obfuscation is one of the most used techniques to ensure such a protection. Consequently, attackers must first detect and characterize obfuscation before launching any attack against it. This paper investigates the problem of function-level obfuscation detection using graph-based approaches, comparing algorithms, from classical baselines to advanced techniques like Graph Neural Networks (GNN), on different feature choices. We consider various obfuscation types and obfuscators, resulting in two complex datasets. Our findings demonstrate that GNNs need meaningful features that capture aspects of function semantics to outperform baselines. Our approach shows satisfactory results, especially in a challenging 11-class classification task and in two practical binary analysis examples. It highlights how much obfuscation and optimization are intertwined in binary code and that a better comprehension of these two principles are fundamental in order to obtain better detection results.
https://doi.org/10.1007/s41109-025-00733-8
1
12
8
BYOVD is a well-known technique commonly used by threat actors to kill EDR 🔪 However, with the right primitives, you can do much more. Find out how Luis Casvella found and exploited 4 vulns (CVE-2025-8061) in a signed Lenovo driver. 👇
blog.quarkslab.com/exploiting-l...
7 months ago
0
1
1
RTFM they say but if you read the manual and copy code examples from it you may inadvertently introduce vulns in your code 🙀 In April we audited the PHP code. Now we followed up with a review of the code snippets in PHP documentation and found 81 issues 👇
blog.quarkslab.com/security-rev...
loading . . .
Security review of PHP documentation - Quarkslab's blog
The Open Source Technology Improvement Fund, Inc., engaged with Quarkslab to perform a security audit of the code snippets in the English version of PHP documentation, focused on some specific pages.
https://blog.quarkslab.com/security-review-of-php-documentation.html
7 months ago
0
6
5
The two bytes that make size matter: Reverse engineering Apple's iOS 0-click CVE-2025-43300 improved bounds checking fix, by Madimodi Diawara
blog.quarkslab.com/patch-analys...
8 months ago
0
5
3
Hacking & Barbecue in the south of France. What could possibly be better? Barbhack starts this Saturday in Toulon and we're giving away a ticket to a student nearby looking to live the experience Send us a Chat msg with your name and school We will notify the winner tonight
www.barbhack.fr/2025/fr/
8 months ago
0
7
6
🚀Ever heard of ControlPlane, software to help you automate tasks on macOS? Turns out, it might also help you become root. Oops! 😱 @coiffeur0x90 found a Local Privilege Escalation vulnerability. Read before someone automates your admin rights 👉
blog.quarkslab.com/controlplane...
loading . . .
ControlPlane Local Privilege Escalation Vulnerability on macOS - Quarkslab's blog
A technical exploration of Local Privilege Escalation Vulnerability in ControlPlane on macOS.
https://blog.quarkslab.com/controlplane_lpe_macos.html
10 months ago
0
0
0
You finally pwned the Holy Confluence server. What now? Create a user? Reset a password? 🚨Best way to trigger an alert What if you craft your own Personal Access Token 🔑 for the Admin account ? Find out how in this blog post by Quarkslab's Red Teamer YV
blog.quarkslab.com/a-story-abou...
10 months ago
0
0
0
The leHack conference (
@le-hack.bsky.social
) starts tomorrow at the Cité des Sciences et de l’Industrie in Paris. We will be there to meet with peers and friends. 3 technical talks, a cool challenge & our famous Car in a Box to play with. Come and say hi at booth 20. Full program here:
lehack.org
loading . . .
leHACK 2025 incoming! - leHACK
false
https://lehack.org/
10 months ago
0
1
0
Are you a network protocol reverse engineer? Tired of writing Wireshark plugins in memory unsafe or esoteric languages named after celestial objects? Now you can do it in a few lines of Go, Python or Rust with Wirego. Benoit Girard explains how here:
blog.quarkslab.com/getting-star...
11 months ago
1
2
3
Attention ✨WomenAtSSTIC✨ We meet at 18:00 today at L'Equinoxe: 3 Place des Lices, 35000 Rennes See you there!
#sstic2025
add a skeleton here at some point
11 months ago
0
0
0
Are you a cyber professional, or a future one, coming to
#sstic2025
next week? Come to ✨WomenATsstic✨, an informal and unofficial friendly meetup on Wednesday, June 4th at 6 pm. We will reserve a bar/café near the Halle Martenot. Register here:
framadate.org/hH2t9FcRtgEG...
loading . . .
Sondage - Women@sstic 2025 - Framadate
Framadate est un service en ligne permettant de planifier un rendez-vous ou prendre des décisions rapidement et simplement.
https://framadate.org/hH2t9FcRtgEGmTWq
11 months ago
0
4
5
Good morning Singapore! The amazing Off by One Conference 2025 starts today. If you are attending don't miss Fred Raynal's (our fearless CEO) keynote at 9:35am: "Spyware for rent & the world of offensive cyber" The full agenda is available here:
offbyone.sg/agenda
12 months ago
0
0
0
Quarkslab was glad to sponsor the Real World Cryptography Paris Meetup 4 hosted by @Ledger last night. Julio Loayza Meneses talked about crypto-condor, our open source tool to test cryptography implementations. You can learn more about it here:
quarkslab.github.io/crypto-condo...
about 1 year ago
0
2
0
Look at those cute little blobs in your internal network. They look harmless, but how about the one carrying SOCKS? It's ProxyBlob, a reverse proxy over Azure. Check out Alexandre Nesic's article on how it came to exist after an assumed breach mission ⤵️ 👉
blog.quarkslab.com/proxyblobing...
about 1 year ago
0
1
2
While casually reading Moodle's code Mathieu Farrell found a SSRF bug exploitable by any authenticated user. Fun twist? This vuln matches exactly the example Orange Tsai presented at Black Hat 2017. Real life imitates conference slides 😅 Details here:
blog.quarkslab.com/auditing-moo...
about 1 year ago
0
1
0
reposted by
Quarkslab
about 1 year ago
We are so excited to announce the publication of our audit of PHP core! This work was made possible through a collaboration between OSTIF,
@thephpf.bsky.social
, and
@quarkslab.bsky.social
with funding provided by
@sovereign.tech
. For the report and further links, check out
ostif.org/php-audit-co...
0
5
3
reposted by
Quarkslab
The PHP Foundation
about 1 year ago
We are pleased to announce the completion of security audit of PHP core! Executed by
@quarkslab.bsky.social
in partnership with
@ostifofficial.bsky.social
and commissioned by the
@sovereign.tech
. Learn more:
thephp.foundation/blog/2025/04...
loading . . .
PHP Core Security Audit Results
The PHP Foundation — Supporting, Advancing, and Developing the PHP Language
https://thephp.foundation/blog/2025/04/10/php-core-security-audit-results/
0
19
11
Quarkslab audited PHP-SRC, the open source interpreter of PHP. The security audit, sponsored by
@ostifofficial.bsky.social
with funding from
@sovereign.tech
, aimed at strengthening the project's security ahead of the upcoming PHP 8.4 release. Here's what we found:
blog.quarkslab.com/security-aud...
loading . . .
Security audit of PHP-SRC
The Open Source Technology Improvement Fund, Inc, thanks to funding provided by Sovereign Tech Fund, engaged with Quarkslab to perform a security audit of PHP-SRC, the interpreter of the PHP language.
https://blog.quarkslab.com/security-audit-of-php-src.html
about 1 year ago
0
6
3
There is a small bug in the signature verification of OTA packages in the Android Open Source Framework. Official builds doing normal double verification of packages are not vulnerable but OEMs and third party apps may be. Jérémy Jourdois explains it here:
blog.quarkslab.com/aosp_ota_sig...
loading . . .
A small bug in the signature verification of AOSP OTA packages
A signature verification bypass in a function that verifies the integrity of ZIP archives in the AOSP framework
https://blog.quarkslab.com/aosp_ota_signature_bug.html
about 1 year ago
0
5
5
Load more
feeds!
log in