Alex Matrosov
@matrosov.bsky.social
📤 250
📥 105
📝 2
reposted by
Alex Matrosov
Sam Thomas
2 days ago
We
@binarly.bsky.social
just open-sourced our VulHunt framework at RE//verse! GitHub:
github.com/vulhunt-re/v...
Documentation:
vulhunt.re/docs
Slack:
join.slack.com/t/vulhunt/sh...
vulhunt.re
loading . . .
VulHunt
Vulnerability Detection Framework by Binarly's REsearch Team
https://vulhunt.re
1
11
6
reposted by
Alex Matrosov
Catalin Cimpanu
9 days ago
Binarly's Alex Matrosov has launched SBOM Tools, a platform to compare and analyze SBOM files to understand software supply chain risks
sbom.tools
loading . . .
sbom-tools — From SBOM to Insight
Semantic SBOM diff and analysis tool. Compare, validate, and assess the quality of SBOMs across CycloneDX and SPDX formats.
https://sbom.tools/
1
17
9
reposted by
Alex Matrosov
Xeno Kovah
4 months ago
It's awesome to see companies like
@binarly.bsky.social
helping support OST2 so it can keep bringing free training to the world! (This could/should be your company too! :))
add a skeleton here at some point
0
3
2
This research demonstrates how easily full persistence can be achieved on Supermicro BMC, allowing complete takeover of the server. - CVE-2025-7937: bypassed “fix” for CVE-2024-10237. - CVE-2025-6198: Supermicro RoT bypass.
www.binarly.io/blog/broken-...
6 months ago
1
2
2
reposted by
Alex Matrosov
raptor :C_H:
9 months ago
Another Crack in the Chain of Trust: Uncovering (Yet Another)
#secureboot
Bypass
https://www.binarly.io/blog/another-crack-in-the-chain-of-trust
loading . . .
Another Crack in the Chain of Trust: Uncovering (Yet Another) Secure Boot Bypass
Comments
https://www.binarly.io/blog/another-crack-in-the-chain-of-trust
0
2
3
reposted by
Alex Matrosov
raptor :C_H:
9 months ago
#Hydroph0bia (CVE-2025-4275) - a trivial
#secureboot
bypass for UEFI-compatible firmware based on Insyde
#h2o
#hydroph0bia
part 1
https://coderush.me/hydroph0bia-part1/
loading . . .
Hydroph0bia (CVE-2025-4275) - a trivial SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O, part 1
https://coderush.me/hydroph0bia-part1/
0
1
5
reposted by
Alex Matrosov
Sam Thomas
10 months ago
We're are happy to announce a new release of our
#Rust
bindings for idalib. What's new: - New APIs for working with IDBs, segments, and more - Rust 2024 support - New homepage:
idalib.rs
H/T to our contributors
@yeggor.bsky.social
&
@raptor.infosec.exchange.ap.brid.gy
github.com/binarly-io/i...
loading . . .
GitHub - binarly-io/idalib: Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib
Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib - binarly-io/idalib
https://github.com/binarly-io/idalib
0
5
9
reposted by
Alex Matrosov
Stefano Zanero
10 months ago
Listening to
@matrosov.bsky.social
and
@pagabuc.bsky.social
at
#RSAC
0
10
1
reposted by
Alex Matrosov
SentinelOne
about 1 year ago
In case you missed it from
#LABScon24
: BINARLY’s
@matrosov.bsky.social
and
@pagabuc.bsky.social
reveal their research into a firmware supply-chain security issue that affected major device vendors and hundreds of models, PKfail. 📺 Watch the full video:
s1.ai/PKfail
loading . . .
1
8
3
you reached the end!!
feeds!
log in