Laurent Clévy
@lorenzo2472.bsky.social
📤 182
📥 551
📝 106
Reverse engineering, files formats and crypto.
https://github.com/lclevy
pinned post!
Curious about cryptography of archive formats zip, rar and 7zip ?
github.com/lclevy/unarc...
12 months ago
0
6
1
reposted by
Laurent Clévy
Sylvain Wallez
about 18 hours ago
This meme is getting out of hand, but it's actually not far from reality 🤣
3
85
43
reposted by
Laurent Clévy
Alexander Hübert
1 day ago
LevelDB-Parser is feature complete (v1.0.0)! 🎉 Analyse the database in raw view (hex) or choose between different views (IndexedDB, IndexedDB Entries, Session Storage, Local Storage and Generic Entries (UTF-8))
github.com/huebicode/le...
loading . . .
GitHub - huebicode/leveldb-parser: Master's thesis project, which involves developing a parser for LevelDB.
Master's thesis project, which involves developing a parser for LevelDB. - huebicode/leveldb-parser
https://github.com/huebicode/leveldb-parser
1
2
1
reposted by
Laurent Clévy
2 days ago
Long overdue, but here’s my writeup for
#FlareOn12
Task 9:
hshrzd.wordpress.com/2025/11/20/f...
loading . . .
Flare-On 12 – Task 9
In this mini-series I describe the solutions of my favorite tasks from this year’s Flare-On competition. To those of you who are not familiar, Flare-On is a marathon of reverse engineering. T…
https://hshrzd.wordpress.com/2025/11/20/flare-on-12-task-9/
0
9
2
reposted by
Laurent Clévy
4 days ago
I chatted with
@hex-rays.bsky.social
about how I found my place in the security industry, how
@blackhoodie.bsky.social
came to be, what our goals are and why community matters so much.
hex-rays.com/blog/blackho...
loading . . .
BlackHoodie Interview: Building Community, Opportunity, & Confidence
BlackHoodie founder Marion Marschalek shares her journey from early challenges to creating a global, inclusive reverse-engineering network.
https://hex-rays.com/blog/blackhoodie-interview-2025
0
7
6
reposted by
Laurent Clévy
Tom McEnroe
4 days ago
This cartoon gets more and more relevant with every passing day
5
157
69
reposted by
Laurent Clévy
eShard
4 days ago
We're in Tokyo presenting our iOS emulator at the CODE BLUE Conference. 📲 You can still join our early adopter program:
u.eshard.com/ios-emulation
#events
#cybersecurity
0
4
1
reposted by
Laurent Clévy
Laurent Cheylus
5 days ago
A minimal Snake Game in 54 bytes of Assembly 🤩 - Full Code by Elisha Hollander in the QR Code below
#Programming
#ASM
#VideoGame
github.com/donno2048/sn...
0
3
1
reposted by
Laurent Clévy
Xeno Kovah
5 days ago
Real ones post their slides before their talk (or at least very shortly thereafter) ;) Slides & materials for HWIO NL talk later this week: “Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools & classes”
darkmentor.com/publication/...
loading . . .
Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools & classes | Dark Mentor LLC
We hold this truth to be self-evident: SUFFERING BUILDS STRENGTH! In this talk I will walk you through the trials, tribulations, and triumph(!) of the worst debugging setup I've ever hacked together, which I used to reverse engineer the Realtek RTL8761B* family of Bluetooth chips.<p>This work was done because Bluetooth security tools are in an abominable state. We use "CSR4" (Cambridge Silicon Radio) dongles that don't support packets newer than Bluetooth 4.0 (released in 2010!), just to be able to spoof the Bluetooth Device Address (BDADDR) for MitM attacks.<p>Veronica Kovah & I have been creating Bluetooth security classes for <a href="https://ost2.fyi/">OpenSecurityTraining2</a>. And we wanted to use better hardware; ideally something that supports BT 5.4 (released in 2023). So I bought a bunch of cheap dongles off Amazon, and found that most of them used the same RTL8761B chip. So the goal was clear: at a minimum, figure out a way to spoof the BDADDR on these dongles. But I also a set out a nice-to-have stretch goal - to figure out how to use these dongles to send custom LMP packets (which are architecturally not meant to be under full user control.) That way, could replace a bulky and expensive $55 dev board (that is only used for BT Classic), with a cheap and small $14 USB dongle (which has a better antenna to boot!) This would make Blue2thprinting (released at Hardwear.io 2023), and thus Bluetooth reconnaissance & vulnerability assessment, cheaper & better.<p>Bloodied (but not broken) by the ordeal, I achieved my goals and stretch goals. And given that there are no public descriptions of how Realtek Bluetooth chips work, I look forward to sharing hitherto-unknown information about how to navigate and understand these mostly-16-bit-MIPS-code systems. And I'll discuss how their ROM-"patch"ing firmware update mechanism works, how you can patch it to change its code too, and the security implications thereof.
https://darkmentor.com/publication/2025-11-hardweario/
0
3
2
reposted by
Laurent Clévy
Laurent Cheylus
5 days ago
En ces temps de commémoration des 10 ans du 13 novembre 2015, j'ai enfin lu la BD « La Cellule » remarquable enquête de Soren Seelow et Kévin Jackson avec Nicolas Otero au dessin
#V13
#BD
arenes.fr/livre/la-cel...
loading . . .
La Cellule - Soren Seelow, Kévin Jackson, Nicolas Otero - Les Arènes
Abdelhamid Abaaoud, djihadiste belge membre de l’État islamique, est l’un des responsables de cette cellule. Plusieurs mois avant les attentats, il est identifié comme une menace importante par les…
https://arenes.fr/livre/la-cellule/
0
1
1
reposted by
Laurent Clévy
Tim Blazytko
5 days ago
I’ll be teaching my next deobfuscation class at
@re-verse.io
(Orlando), Mar 2–5, 2026. Learn to dissect modern protections, devirtualize VMs, and simplify MBA expressions using symbolic execution, SMT solving, and synthesis. Details:
shop.binary.ninja/products/re-...
0
1
1
reposted by
Laurent Clévy
Laurent Cheylus
6 days ago
Dozens of M.C. Escher Prints have been digitized and put Online by the Boston Public Library
#Maths
#Paintings
#Arts
www.openculture.com/2025/11/doze...
loading . . .
Dozens of M.C. Escher Prints Have Been Digitized & Put Online by the Boston Public Library
In addition to the iconic scene in Jim Henson’s Labyrinth, or appearances in animated TV shows and video games, M.C.
https://www.openculture.com/2025/11/dozens-of-m-c-escher-prints-have-been-digitized-put-online.html
0
4
3
reposted by
Laurent Clévy
Hexacorn
7 days ago
less known way to calculate sha256 of files on Windows disksnapshot -c -k -v c:\test will print out file info including sha256 for every file in the directory
0
8
4
reposted by
Laurent Clévy
OpenSecurityTraining2
8 days ago
Periodic call for volunteers: We're looking for classes on Apple ecosystem security. E.g. OS internals, binary formats, malware analysis, vulnerability hunting, etc. If you're interested in sharing what you know, reach out at teach🌀ost2.fyi
0
3
2
reposted by
Laurent Clévy
9 days ago
Squeeeee 🥳 I'll be teaching my Advanced Linux Malware Reverse Engineering class at RE//verse conference in 2026!! MORE Linux APT insides and peculiarities😍🥰🤩Pls share if you can🙃
shop.binary.ninja/products/re-...
loading . . .
RE//verse 2026 Training - Advanced Linux Malware Reverse Engineering with Marion Marschalek
This fast-paced 3-day training explores Linux internals and Linux binary analysis techniques, before jumping right in with common Linux malware. Work through advanced samples, Linux software protectio...
https://shop.binary.ninja/products/re-verse-2026-linux
0
25
12
reposted by
Laurent Clévy
Hex-Rays
9 days ago
Check out how Billy Ellis dives into 1-click iOS browser exploits, walking through CVE-2020-9802, a JIT bug. Great step-by-step explanation of how WebKit and JavaScriptCore vulnerabilities are exploited.
loading . . .
How 1-Click Can Hack Your iPhone
YouTube video by Billy Ellis
https://youtu.be/o6mVgygo-hk
0
1
1
reposted by
Laurent Clévy
Alexandre Borges
10 days ago
Mojo GPU Puzzles:
puzzles.modular.com/introduction...
#crypto
#gpu
#python
#infosec
#informationsecurity
#programming
0
2
1
reposted by
Laurent Clévy
diversenok
11 days ago
I wanted to understand what information is available in .pdb files, so I made a tool for it 🔎🐛 Welcome DiaSymbolView - a debug symbol hierarchy and properties viewer based on MSDIA:
github.com/diversenok/D...
1
9
4
reposted by
Laurent Clévy
Revision Demoparty
11 days ago
Revision is a non-profit event; however, that does not make us non-cost. Do you want to help us in realising one of the biggest participatory programming art events? Then we'd be excited to have you!
[email protected]
#digitalart
#programming
#culture
#sponsoring
#demoscene
#floss
0
16
22
reposted by
Laurent Clévy
11 days ago
Le 16 novembre je serai au
@capitoledulibre.org
à Toulouse. Une belle occasion de retrouver la communauté du libre et de parler bidouille & créativité. Je présenterai LaserMagic (
lasermagic.ci-yow.com
) un logiciel **libre** de gravure et découpe laser.
loading . . .
Documentation
https://lasermagic.ci-yow.com/fr/docs/laser/
1
1
1
reposted by
Laurent Clévy
Xeno Kovah
12 days ago
🧵⬇️Low level security timeline update!⬆️ 2025-11-09 Part 1 After over a year, I've finally updated the Low Level PC/Server Attack & Defense Timeline!
darkmentor.com/timeline.html
The 2025 talks are in this thread, and pre-2025 will be next time. 👇
loading . . .
Low Level PC/Server Attack & Defense Timeline — By @XenoKovah of @DarkMentorLLC
https://darkmentor.com/timeline.html
1
2
2
reposted by
Laurent Clévy
Alexandre Dulaunoy
14 days ago
We presented “Advancing Vulnerability Tracking and Disclosure Through an Open and Distributed Platform” at the excellent @UYBHYS
#cve
#vulnerability
#opensource
#vulnerabilitymanagement
#cybersecurity
🔗
https://www.vulnerability-lookup.org/2025/11/08/unlock-your-brain-2025/
loading . . .
Advancing Vulnerability Tracking and Disclosure Through an Open and Distributed Platform at Unlock Your Bain conference
Slides: Advancing Vulnerability Tracking and Disclosure Through an Open and Distributed Platform We presented “Advancing Vulnerability Tracking and Disclosure Through an Open and Distributed Platform” at the excellent Unlock Your Brain conference. A well-organised and welcoming event, Unlock Your Brain brings together a great mix of researchers, practitioners, and open-source enthusiasts—making it a perfect place to exchange ideas on vulnerability tracking and disclosure. Download the slides: https://www.vulnerability-lookup.org/files/events/2025/presentation-unlockyourbrain.pdf
https://www.vulnerability-lookup.org/2025/11/08/unlock-your-brain-2025/
0
10
4
reposted by
Laurent Clévy
Astropierre
14 days ago
Développement d'un antivenin à large spectre, utilisant des anticorps de lama et d'alpaga, capable de se lier aux toxines nécrosantes et de neutraliser, chez les souris, le venin de 17 espèces de serpents d'Afrique subsaharienne, dont des cobras et des mambas.
www.nature.com/articles/s41...
2
106
21
reposted by
Laurent Clévy
Laurent Cheylus
14 days ago
S.A.R.C.A.S.M: Slightly Annoying Rubik's Cube Automatic Solving Machine - A 3D-printed, Teensy-powered Robot that scans and solves a Rubik’s Cube
#3DPrint
#Robot
#DIY
github.com/vindar/SARCASM
0
3
1
reposted by
Laurent Clévy
Léαlinux 🐧
14 days ago
/!\
fsfe.org/news/2025/ne...
loading . . .
Jean-Baptiste Kempf receives the European SFS Award 2025 at SFSCON - FSFE
The FSFE and LUGBZ have recognized VLC president and core developer with this European award for his long-term dedication to the project. What began as a s...
https://fsfe.org/news/2025/news-20251107-01.fr.html
0
17
12
reposted by
Laurent Clévy
Andrey Konovalov
15 days ago
Updates for the Linux kernel exploitation collection 😋
github.com/xairy/linux-...
loading . . .
September/October updates · xairy/linux-kernel-exploitation@b26cc4a
https://github.com/xairy/linux-kernel-exploitation/commit/b26cc4a2e60262950f5a3ad851c846d699b0df75
0
2
1
reposted by
Laurent Clévy
eShard
19 days ago
Keccak powers SHA-3, KMAC and many post-quantum algorithms, but how does it behave under side-channel analysis? 🔗 Register here:
u.eshard.com/wcUfh
Second session:
u.eshard.com/4hGSQ
#webinar
#pqc
#nistsecurity
0
4
2
reposted by
Laurent Clévy
Pass the SALT Conference
18 days ago
SAVE THE DATE! The organisation of the
#pts26
edition is starting 😎 📣 Info we can already share are: - 🗓️ Tuesday June 30 to Thursday July 2, 2026 ✅ - 📍as asked in your feedback answers, we will be again at Université Catholique de Lille 🎉 Website & more are coming soon! 😘
loading . . .
0
5
4
reposted by
Laurent Clévy
Unlock Your Brain, Harden Your System
about 1 month ago
#UYBHYS
[Samedi 8/11 13h45] CONFÉRENCE de David Le Goff (CERT Aviation) : Construire son CERT mobile pour une CTI adaptée !
unlockyourbrain.bzh/conferences/
#UYBHYS25
0
3
5
reposted by
Laurent Clévy
David Buchanan
19 days ago
Decompress DEFLATE using only HTML5 Canvas
retr0.id/stuff/canvas...
10
95
20
reposted by
Laurent Clévy
PentesterLab
19 days ago
Articles worth reading discovered last week: Passports, WIFI and AI-SAST! 🛂
blog.trailofbits.com/2025/10/31/t...
🛜
pulsesecurity.co.nz/articles/byp...
🧠
parsiya.net/blog/wtf-is-...
loading . . .
The cryptography behind electronic passports
This blog post describes how electronic passports work, the threats within their threat model, and how they protect against those threats using cryptography. It also discusses the implications of usin...
https://blog.trailofbits.com/2025/10/31/the-cryptography-behind-electronic-passports/
0
6
5
reposted by
Laurent Clévy
CPU ⬜ Carré Petit Utile
20 days ago
Un vrai pentest dans les règles, ce n'est as dans la série Mr Robot qu'on a trouvé cet exemple mais dans Better call Saul (s04e01)
www.youtube.com/watch?v=bADb...
loading . . .
Mike conducts a physical pentest (annotated)
YouTube video by Ryan Jonker Cybersecurity
https://www.youtube.com/watch?v=bADbkzVhfRI
0
5
3
@decalage.bsky.social
add a skeleton here at some point
20 days ago
0
1
0
reposted by
Laurent Clévy
22 days ago
Seattle,
@blackhoodie.bsky.social
is coming to town! Thanks to IOActive we're hosting 2 days of trainings for women by women on Nov 14 & 15, brought to you by
@barbieauglend.bsky.social
Bhavna Supriya and Hanne!
blackhoodie.re/Seattle2025/
0
4
4
reposted by
Laurent Clévy
Laurent Cheylus
22 days ago
Understanding Docker Internals: Building a minimal Container Runtime with Python on Linux using Namespaces, Control Groups and Filesystem Isolation
#Docker
#Linux
muhammadraza.me/2024/buildin...
loading . . .
Understanding Docker Internals: Building a Container Runtime in Python | Muhammad
Breaking down container technology by building a simple container runtime from scratch using Python and Linux primitives like namespaces and cgroups
https://muhammadraza.me/2024/building-container-runtime-python/
0
14
8
reposted by
Laurent Clévy
Fenarinarsa
22 days ago
L'association
@assomo5.bsky.social
vient d'annoncer l'ouverture de son Musée du Jeu Vidéo début décembre à Arcueil (au sud de Paris). Celles et ceux qui ont visité l'exposition Game Story à Versailles ont pu voir une avant-première de ce musée !
1
60
37
reposted by
Laurent Clévy
Zion Leonahenahe Basque
23 days ago
You've seen the trends in AIxCC: LLMs can hack source, find vulns, and patch them. But what about on binaries without source? Do decompilers close the gap, or is there more to grow? Come see my talk at DistrctCon where I merge and dissect these two fields: AI Hacking + Decomp.
0
6
3
reposted by
Laurent Clévy
Bellingcat
25 days ago
A man sits before a pit of the dead. Nazi soldiers surround him—one aims a gun at his head. For decades, no one knew who they were or where this photo was taken. Now, new digital tools and help from our community may finally reveal the truth behind this haunting Holocaust image🧵
12
492
178
reposted by
Laurent Clévy
Catalin Cimpanu
25 days ago
"Out of the multiple vulnerabilities we reported, WSO2 addressed and assigned a CVE identifier to only one: the Siddhi RCE via SOAP administration services (CVE-2025-5717 ). The remaining vulnerabilities were not remediated, and no CVEs were assigned by WSO2" Le sigh...
blog.lexfo.fr/wso2.html
loading . . .
Attacking WSO2 Products
<p>Uncovering bypasses, RCE, SSRF, CSRF, and account-takeover vulnerabilities in WSO2 products.</p>
https://blog.lexfo.fr/wso2.html
0
8
4
reposted by
Laurent Clévy
Python Software Foundation
26 days ago
TLDR; The PSF has made the decision to put our community and our shared diversity, equity, and inclusion values ahead of seeking $1.5M in new revenue. Please read and share.
pyfound.blogspot.com/2025/10/NSF-...
🧵
loading . . .
The official home of the Python Programming Language
https://www.python.org/sponsors/application/
128
6432
3234
reposted by
Laurent Clévy
ave
26 days ago
Are there any options for EU-based donations for tax deductability over here? I know there are some charities here that exist to relay donations to US based 501(c)(3)s, but idk if any cover PSF.
2
122
2
reposted by
Laurent Clévy
Philippe Lagadec
26 days ago
At
hack.lu
I gave a presentation about "How to better identify (weaponized) file formats": - Why do we need to identify file formats accurately? - Why can the current tools (libmagic, magika) sometimes be bypassed? - How can we do better? You can now see it here:
youtu.be/Qp5GDh2sj6A
#HackLu
loading . . .
hack.lu 2025
Hack.lu (and CTI summit) is an open convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society. It’s the ...
https://hack.lu
0
5
3
reposted by
Laurent Clévy
26 days ago
Y'all fantastic news! Save the date,
@blackhoodie.bsky.social
will be at
@districtcon.bsky.social
this year 😱 the fantastic crew has offered to host us for a day of Malware Reverse Engineering!
@synapticrewrite.bsky.social
and myself will be hosting a training for women by women on January 23rd!!
0
20
9
Please pardon my English 😅
add a skeleton here at some point
27 days ago
0
6
1
reposted by
Laurent Clévy
Cooper
27 days ago
How To Better Identify (Weaponized) File Formats With Ftguess - Philippe Lagadec
youtu.be/Qp5GDh2sj6A
#HackLu
loading . . .
How To Better Identify (Weaponized) File Formats With Ftguess - Philippe Lagadec
YouTube video by Cooper
https://youtu.be/Qp5GDh2sj6A
0
2
2
reposted by
Laurent Clévy
Cooper
about 1 year ago
I've put together a website which indexes all the recordings my rigs have made thus-far as well as those currently planned:
administraitor.video
(minimalist - I'm a mid-/backend dev! 😋)
loading . . .
Infosec/hacking videos recorded by Cooper (@Ministraitor)
Infosec/hacking videos recorded by Cooper (@Ministraitor)
https://administraitor.video
0
16
9
reposted by
Laurent Clévy
ScottBatemanArt
27 days ago
An animated loop basd on the games of the ZX Spectrum 8 bit micro from the 1980s This was made in photoshop and Blender and just a fun little tribute to my all time favourite home computer
#zxspectrum
#retrogaming
#pixelart
#8bitart
loading . . .
24
307
112
x.com/Ministraitor...
loading . . .
Cooper on X: "Reversing A Pay Phone For Fun But No Profit - Inbar Raz https://t.co/UDVhDBT9iJ #HackLu @hack_lu" / X
Reversing A Pay Phone For Fun But No Profit - Inbar Raz https://t.co/UDVhDBT9iJ #HackLu @hack_lu
https://x.com/Ministraitor/status/1980970441679229351?t=Wk_PKJPsHQGO47fkYE4GhA&s=09
28 days ago
0
0
0
reposted by
Laurent Clévy
about 1 month ago
I held a talk about reverse engineering and bypassing Denuvo in Hogwarts Legacy at Navaja Negra The recording and the slides are now online :D
momo5502.com/posts/2025-1...
loading . . .
Reverse Engineering Denuvo in Hogwarts Legacy
Talk at Navaja Negra 2025 This technical presentation explores the inner workings of Denuvo Anti-Tamper, one of the gaming industry’s most widely deployed DRM solutions. Through detailed reverse engin...
https://momo5502.com/posts/2025-10-03-reverse-engineering-denuvo-in-hogwarts-legacy/
1
4
4
reposted by
Laurent Clévy
Trend Zero Day Initiative
30 days ago
🖨️ Print victory! Team
@neodyme.io
just hacked the Canon imageCLASS MF654Cdw at
#Pwn2Own
. They head off to the disclosure room once more to provide the details of their exploit.
#P2OIreland
0
5
2
Load more
feeds!
log in