Mathilde Venault

50 posts

Mathilde Venault banner
Mathilde Venault

Mathilde Venault

@MathildeVenault

Security researcher at @CrowdStrike, living off cheese and adventures. Opinions are my own.

Katılım Kasım 2019
190 Takip Edilen270 Takipçiler
Connor McGarr
Connor McGarr@33y0re·
I am over the moon to have spoken at @BlackHatEvents USA for my first time, about KCFG and KCET on Windows. It has been a goal of mine to always speak here and I am very pleased to have done so!
Connor McGarr tweet mediaConnor McGarr tweet mediaConnor McGarr tweet mediaConnor McGarr tweet media
English
7
13
172
14.7K
Mathilde Venault retweetledi
Kyle Cucci
Kyle Cucci@d4rksystem·
I often am asked for pointers on building a VM for malware analysis. I wrote a 40+ page chapter on this in my book Evasive Malware. You can download this chapter from the book on my blog for free here: evasivemalware.com/EvasiveMalware… Thanks @nostarch for allowing me to give it away 🤓
English
2
53
259
16.4K
Mathilde Venault retweetledi
Yarden Shafir
Yarden Shafir@yarden_shafir·
Looks like @BlueHatIL talks are online now, so here’s my talk for anyone who wanted to learn about the latest episode of KASLR and couldn’t make it: youtu.be/Dk2rLO2LC6I
YouTube video
YouTube
English
10
83
301
47.9K
Mathilde Venault retweetledi
Yarden Shafir
Yarden Shafir@yarden_shafir·
FYI if you’re willing to link with ntdll or dynamically resolve it there’s a ton of APIs that return TEB/PEB or leave them in one of the registers. (Don’t believe official return values. MSDN is a liar!)
Yarden Shafir tweet media
vx-underground@vxunderground

Daax, being the traditional memesteroni he is, shared a cool proof-of-concept which demonstrates how to get a pointer to the Process Environment Block without using the GS and/or FS register. Look at the full thread. It's interesting.

English
3
36
275
29.6K
Mathilde Venault retweetledi
clearseclabs
clearseclabs@clearseclabs·
Upcoming public training: #portfolio" target="_blank" rel="nofollow noopener">clearseclabs.com/#portfolio
clearseclabs tweet media
English
0
1
1
179
Mathilde Venault
Mathilde Venault@MathildeVenault·
Really excited to give a talk at SINCON this year! I'll be presenting my tool github.com/CrowdStrike/dr…, that helps making the most of WinDbg in a minimum amount of time
Infosec In the City (IIC)@Infosec_City

Join @MathildeVenault at SINCON 2025 to discover how DrawMeATree helps reverse engineers visualise & decode complex systems faster. 📅22-23 May 2025 | 📍voco Orchard, SG 🎟️Pass: event.cybersecuritysg.com/39kL3 #SINCON2025

English
0
3
15
3.3K
Mathilde Venault retweetledi
Mari0n
Mari0n@pinkflawd·
Save the date - @Blackhoodie_RE is partnering with @offensive_con this year to bring a BlackHoodie training to Berlin! Students will learn how to place compiler backdoors in innocent code. Mark your calendars for May 15th! Registration opens tomorrow, space is very limited ☺️
English
0
14
25
12.2K
Mathilde Venault retweetledi
Yarden Shafir
Yarden Shafir@yarden_shafir·
I’m not saying you definitely have to go to @BlueHatIL this year, I’m just letting you know it’s free, by the beach and I’ll be there dropping kernel pointers to anyone who asks nicely
Yarden Shafir tweet media
English
3
22
107
15.7K
Mathilde Venault retweetledi
clearbluejar
clearbluejar@clearbluejar·
#CVE-2025-21419 2025-Feb Windows Setup Files Cleanup Windows Setup Files Cleanup Elevation of Privilege #ghidriff uncovering arbitrary delete vulnerabilities 👀 🔍 Patch introduced new function DeleteFileEx_MSRC. Not your typical function name... 🧐 A patch diffing 🧵...
clearbluejar tweet mediaclearbluejar tweet media
English
2
10
26
2.7K
Mathilde Venault retweetledi
Connor McGarr
Connor McGarr@33y0re·
Today I’m sharing a blog post on the implementation of kernel mode shadow stacks on Windows! This post covers actively debugging the Secure Kernel and also outlines why VTL 1 is relied on to help maintain the integrity of the supervisor shadow stacks! connormcgarr.github.io/km-shadow-stac…
English
10
153
497
52.9K
Mathilde Venault
Mathilde Venault@MathildeVenault·
I'm happy to share that I'll be giving a workshop at @44CON about WinDbg, where I'll introduce a tool I've developed to make debugging much easier. Time to tame the Windows debugger together! 44con.com/44con-2024-tal…
English
1
8
43
5.5K
Mathilde Venault retweetledi
gaut
gaut@0xgaut·
look what they took from us
gaut tweet media
English
4.1K
77.2K
854.7K
44.5M
Or Yair
Or Yair@oryair1999·
Honored to announce that @_BinWalker_ and I were accepted to speak at @defcon ! Our research - "QuickShell: Sharing is caring about an RCE attack chain on Quick Share" showcases 10 vulns in Google's Quick Share, chained to a creative RCE attack chain on Quick Share for Windows
Or Yair tweet media
English
2
2
12
2K
Mathilde Venault retweetledi
Connor McGarr
Connor McGarr@33y0re·
Recently I was writing up a blog about Secure Kernel and NT working together to initialize Kernel CFG. I realized there were a lot of concepts in SK I was unfamiliar with. Because of this I wrote a post on one of those topics - Secure Image Objects. Enjoy! connormcgarr.github.io/secure-images/
English
11
103
281
29.8K
Mathilde Venault retweetledi
Bill Demirkapi
Bill Demirkapi@BillDemirkapi·
Thanks to everyone who attended my talk! @offensive_con was an incredible experience. Couldn't make it? Don't worry- here are my slides! Recommend them to anyone wanting to learn more about Secure Boot's third-party risks. nbviewer.org/github/microso…
Bill Demirkapi@BillDemirkapi

Ecstatic to share that my talk was accepted to Offensive Con. Excited to have an excuse to visit the city I was born in. Hope to see you there!

English
3
15
72
28.3K