mhoste

32 posts

mhoste

mhoste

@mhoste1

Security engineer at @FuzzingLabs

Katılım Mayıs 2022
148 Takip Edilen156 Takipçiler
mhoste retweetledi
FuzzingLabs
FuzzingLabs@FuzzingLabs·
Day 3 (out of 4) of our "Reversing Modern Binaries" training at REcon Montreal is kicking off! 👨‍🏫The energy and insights from this group have been amazing. Couldn't join us in Montreal? Your next chance is coming up at the @POC_Crew conference in Seoul this November! 🇰🇷 🚨 FINAL CALL! There are only 5 days left to get the early-bird discount. Register before June 30th to get the discount. Discover the Seoul training program👉 fuzzinglabs.com/p0c-2025-rever… Register👉#registration" target="_blank" rel="nofollow noopener">powerofcommunity.net/#registration #ReverseEngineering #InfoSec #Training #REcon #Montreal #POC2025 #Seoul #Rust #Go
FuzzingLabs tweet media
English
0
9
41
3.4K
mhoste retweetledi
FuzzingLabs
FuzzingLabs@FuzzingLabs·
Uncovering Hidden Threats in Ethereum Virtual Machines 🚨 At #Zer0Con2025, we exposed critical vulnerabilities in Ethereum Virtual Machines (EVMs) using fuzzing. Here’s what you need to know 🧵👇 #Ethereum #EVM #Fuzzing #BlockchainSecurity
FuzzingLabs tweet media
English
2
12
68
4.2K
mhoste retweetledi
POC_Crew
POC_Crew@POC_Crew·
[#Zer0Con2025] 🎙️ SPEAKER Highlight: @lxt33r / @mhoste1 "Ethereum's Achilles' Heel: Attacking and Fuzzing EVMs for Fun (and Profits)" 💼
POC_Crew tweet media
English
1
10
42
5.5K
mhoste retweetledi
Hell Diner
Hell Diner@DinerHell·
🔥Introducing Arion🔥 A high-performance C++ framework for emulating executable binaries. Based on Unicorn and inspired by Qiling, Arion offers an easy-to-use interface and super low execution times making it a great ally for fuzzing or other applications. github.com/h311d1n3r/Arion
Hell Diner tweet media
English
2
21
54
4.3K
mhoste retweetledi
Nofix
Nofix@N0Fix·
Just wrote a new blog post about rust symbol recovery, this time targeting cross-compiled targets ! Here is the blog post: nofix.re/posts/2024-23-… I also updated rustbinsign/rustbininfo to identify and handle MinGW targets accordingly.
English
1
33
81
5.4K
mhoste retweetledi
Laluka@OffenSkill
Laluka@OffenSkill@TheLaluka·
Hi friendz ! 🧙‍♂️ - Prochain Stream ce Mardi 18 Juin à 21h ! 🕯️ - Topic : Reversing RUST Vs CPP Vs C ! 🤔 On part sur 2h+ sur quelques bases, les différences fondamentales entre les technologies proposées, et les approches de nos différents invités, à savoir @N0Fix, @mhoste1, et @lxt33r ! 😎😎😎 A très vite pour se casser le crane sur du low level ! 🤙🛠️ discord.gg/tH8wEpNKWS twitch.tv/thelaluka
Français
0
2
13
1.5K
mhoste retweetledi
Nofix
Nofix@N0Fix·
I just wrote a blog post and made a tool about my journey into recovering symbols from KrustyLoader, a malware written in rust @ektoplasma_ from @Synacktiv analyzed not long ago. Check it out if you are into rust reverse engineering ! 😁 nofix.re/posts/2024-11-…
English
1
26
64
4.3K
mhoste retweetledi
LiveOverflow 🔴
LiveOverflow 🔴@LiveOverflow·
Web Security vs. Binary Exploitation
English
99
1.9K
10.2K
832.9K
mhoste retweetledi
thehackerscrew
thehackerscrew@thehackerscrew1·
This weekend we played @HacksInTaiwan CTF 2023. The challenges were amazing and we finished 13th. Congratulations to @Water_Paddler and @pb_ctf for absolutely nailing the scoreboard 💪
thehackerscrew tweet media
English
0
5
15
2.4K
mhoste retweetledi
Hell Diner
Hell Diner@DinerHell·
Cerberus v1.2 is out ! The tool can now recover symbols of stripped Go binaries in addition to Rust. The rate is still of ~90%. 🔥I am open to any feedback🔥 github.com/h311d1n3r/Cerb…
English
1
46
99
9.4K