's Avatar

@cryptax.bsky.social

Android malware analysis. Ph0wn CTF founder. IoT hacking. Frequent speaker at Virus Bulletin, Insomnihack etc. Based in France. Currently testing Bluesky. Otherwise on Mastodon.social.

248 Followers  |  174 Following  |  120 Posts  |  Joined: 07.01.2024  |  1.6495

Latest posts by cryptax.bsky.social on Bluesky

Post image

Are you stuck on one of the first 2 challenges of #FrangiPh0wn? As the teaser ends in 2 days, we've released a few hints, and hope they will help you reach the next level ;)

ctf.ph0wn.org

#RF #OSINT #AI #retrogaming #ph0wn #CTF

07.02.2026 13:30 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Image of pirates, with pirate ships in background. This advertises for Ph0wn's creative contests, where if you "exploit the outfit", you get a chance to win a Hydrabus. https://ph0wn.org

Image of pirates, with pirate ships in background. This advertises for Ph0wn's creative contests, where if you "exploit the outfit", you get a chance to win a Hydrabus. https://ph0wn.org

πŸ“… March 13-14, 2026 - Sophia Antipolis, France

🀠 Prepare your best outfit for Ph0wn CTF's side event: the "Creative Contest". Come dressed up as a pirate, and get a chance to win a Hydrabus πŸ˜ƒ

πŸ‘‰οΈ Details: ph0wn.org/contest/

#CTF #ph0wn2026 #pirate #flagship #hydrabus #hacker
Re-posts appreciated

26.01.2026 13:58 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

All hands on keyboard, pen to paper - Elbsides 2026 Call for Paper is open!!!

Make good on your New Year resolution to contribute to the infosec community and present on June 5th in Hamburg.

www.elbsides.eu/2026/cfp/

#elbsides2026 #CFPisopen #startwriting #infosec

14.01.2026 13:34 β€” πŸ‘ 3    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

FrangiPh0wn, the Ultimate Galette for Hackers and ph0wn CTF teaser, is up until Feb 9. Head to ctf.ph0wn.org, and find the trinkets!

Are you up to it? Only 15 participants flagged something up to now. Go for it!

#CTF #teaser #RF #OSINT #ph0wn #frangiph0wn

10.01.2026 12:38 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Ph0wn #CTF Teaser Announced for January!

We hope you get the right tools and skills for Xmas :D
Get ready! We will announce #FrangiPh0wn in January.
Keep an eye on ph0wn.org

16.12.2025 15:55 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Cryptax Nomination Awards 2025 H2 Cryptax Nomination Awards. Lol. In other words, I’m listing my favorite talks, papers, challenges (etc) for the second half of 2025. Nothing more than that. Okay? H2 2025 Category Nominated Best secur...

Best talks, papers, CTF challenges, tools I encountered in the second half of 2025:

cryptax.github.io/nomination-2...

Congratulations to those who are listed, and kudos to others :)

cc: @trufae.bsky.social @uybhys.bsky.social @nst021.bsky.social @synacktiv.com

16.12.2025 11:04 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 1

Excellent game, I loved it! Work, work!

12.12.2025 13:06 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
New eBPF Filters for Symbiote and BPFdoor Malware | FortiGuard Lab FortiGuard Labs discovered new Symbiote and BPFDoor variants exploiting eBPF filters to enhance stealth through IPv6 support, UDP traffic, and dynamic port hopping for covert C2 communication.…

Variants of 2025 of Symbiote and BPFDoor support IPv6, UDP communication with C2.

Reverse engineering the samples with r2ai and r2mcp.

www.fortinet.com/blog/threat-...

#malware #Linux #BPF #r2ai #r2mcp

08.12.2025 08:40 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Pour mon atelier "Reverse engineering with r2ai" Γ  @uybhys.bsky.social demain, si vous avez un laptop x86, tΓ©lΓ©chargez en avance l'image:

docker pull cryptax/r2ai:2025.11

#radare2 #IA #r2ai #UYBHYS25 #docker #workshop

06.11.2025 21:51 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Merci de prΓ©-installer sur vos laptops: Docker, Python 3 et Java.

Cet atelier est accessible Γ  ceux qui ne connaissent ni Radare2 ni Ghidra.
Mais il est conseillΓ© d'avoir des bases en assembleur ou d'avoir dΓ©jΓ  dΓ©compilΓ© des binaires (qq soit le logiciel utilisΓ©).
C'est un peu technique qd meme...

04.11.2025 10:46 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Ca va parler de Radare2, de Ghidra, de MCP et d'assembleur en tout genre. L'objectif est d'utiliser l'IA pour faciliter la rΓ©tro-ingΓ©nierie. L'IA ne fait pas tout (par exemple, elle ne fait pas les crΓͺpes que je compte dΓ©guster sur place), mais elle aide ... si on sait l'utiliser.

Venez !

04.11.2025 10:44 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Post image

#UYBHYS

A l'occasion de #UYBHYS25, de 10h Γ  17h les vendredi 7 et samedi 8 novembre, @ratzillas.bsky.social animera, sur le parvis du #Quartz Γ  #Brest, un atelier de dΓ©monstration de "Car Hacking", accessible Γ  toutes et tous sans inscription. πŸ™‚

03.11.2025 11:43 β€” πŸ‘ 7    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
Preview
Unlock Your Brain, Harden Your System #UYBHYS ! 7 Novembre 2025 – 8 Novembre 2025

#UYBHYS #UYBHYS25 #Brest

Il reste encore des places pour quelques ateliers de vendredi et pour la journΓ©e de confΓ©rences de samedi.

Billetterie : pretix.eu/cantine/UYBH...

03.11.2025 12:42 β€” πŸ‘ 2    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0

Setting up your laptop before the workshop:

- It helps if you have already installed Radare2: radare.org/n/radare2.html .

- If you want to isolate your own OS from the workshop, I recommend Exegol, or Docker, or a Kali VM.

#radare2 #exegol #docker #kali #brucon

22.09.2025 14:42 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

On Thursday afternoon, I am thrilled to give my first r2ai & ghidraMCP workshop at BruCON.

Pre-requisites: you are good to go if you already have reversed a binary (with whatever #disassembler, it doesn't matter) OR if you have basic skills and understanding in #assembly.

#mcp #LLM #AI

22.09.2025 14:41 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Linux/Trigona analysis of /fast option Recorded by cryptax

One of the demos is here: asciinema.org/a/pBPEaJhp6c...

It demonstrates the automatic mode of r2ai, where we can ask a question whose answer requires to read/understand several functions of the binary.

#radare2 #r2ai #AI #LLM

01.09.2025 08:15 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Publications | FortiGuard Labs <p>This talk presents 2 different Linux malware:</p><ul><li><p>a shellcode, named Linux/Shellcode_ConnectBack.H!tr. The binary is small and compact, but traditional disassemblers like Ghidra fail to p...

Slides of my prez at Barb'hack: www.fortiguard.com/events/6189/...

Understand what a recent sample of Linux/Trigona #ransomware does.

Learn how to spot #AI errors (hallucinations, omissions etc), learn how to tweak context length, output token limits to get the best out of your model.

#barbhack25

01.09.2025 08:13 β€” πŸ‘ 6    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0

Nevertheless, I've done more reverse engineering on Android malware than for Linux malware. I'm not "a strong expert", and r2ai lowered the bar + it quickens the analysis.

I think that's the goal of r2ai: give malware analysts a nice tip when they need one + speed up their work.

n=3

31.08.2025 08:48 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Nobody would expect me to play the violin in a concert hall tomorrow, even with the help of AI.
And, to be honest, that wouldn't even be good, it would devalue the profession.
The same applies to anti-virus research.

2/n

31.08.2025 08:44 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

I had (several) interesting questions yesterday on r2ai.
One of them was that, obviously the tool needed to be used by an experienced reverse engineer.
I'd like to comment a bit further.
I feel normal that such a tool cannot be used by total beginners. All jobs require some adequate training. 1/n

31.08.2025 08:38 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image Post image Post image

Barb'hack is over and it was a pleasure to attend: very nice folks, friendly organizers, excellent food, best rumps lol and a CTF with a videogame interface+ challenges on Minitel. I loved it! Kudos to the staff.
#barbhack25

31.08.2025 05:52 β€” πŸ‘ 6    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Thanks!

30.08.2025 15:05 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
this image was generated by Dall-E based on a prompt that describes what Linux/Trigona malware does. The malware is implemented in Delphi, thus the FPC (Free Pascal Compiler).

this image was generated by Dall-E based on a prompt that describes what Linux/Trigona malware does. The malware is implemented in Delphi, thus the FPC (Free Pascal Compiler).

I've very happy to speak at Barb'hack on Saturday.
barbhack.fr/2025/fr/conf...

There will be 2 demos.
One live.
One recorded - simply because I don't have the guts to do it live ;P

We reverse engineer Linux/Trigona and Linux/Shellcode with radare2 + AI + HI

HI standards for Human Intelligence ;P

25.08.2025 10:57 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Hey, @lastpass.bsky.social I wish you'd fix that. True, it involves a malicious website, but it's really difficult to spot from the end-user's perspective.
How about asking for a confirmation password before sharing the password database perhaps?

21.08.2025 08:47 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
DOM-based Extension Clickjacking: Your Password Manager Data at Risk I described a new attack technique that I used against 11 password managers. The result was that stored data of tens of millions of users could be at risk.

Overlays are often used in Android malware.
They are actually a burden to other domains such as browser extensions. This research, by Marek Toth, shows how click jacking [on hidden overlays] can trick the end-user in sharing his/her entire password manager.

marektoth.com/blog/dom-bas...

21.08.2025 08:43 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Aug 24
Last-minute CFP still open - only 5 days left
VB2025 Berlin 24-26 Sept 2025

Aug 24 Last-minute CFP still open - only 5 days left VB2025 Berlin 24-26 Sept 2025

Last chance to share your research at VB2025.

Whether you have fresh research, practical insights, or real-world case studies to share, now is your moment to step into the spotlight!

πŸ“… 24 Aug 2025 β€” only 5 days left
πŸ“ Berlin. 24–26 Sept 2025

πŸ‘‰ tinyurl.com/3mccm8br

19.08.2025 15:13 β€” πŸ‘ 1    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
r2ai with lmstudio and gpt-oss Background: radare2, nickname β€œr2”, is an awesome open source disassembler. r2ai is an open source plugin for r2 to communicate with an AI.

Full explanation of why/how in my blog post: cryptax.medium.com/r2ai-with-lm...

19.08.2025 14:20 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

I've recently setup a LM Studio server, with several models including gpt-oss. I can use it from my disassembler, here to analyze a Linux/Trigona sample.

Learn more about Trigona at Barb'hack on Aug 30 in Toulon.

#AI #malware #reverse #assembly #context #lmstudio #GPT

19.08.2025 14:19 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Preview
Let Me Cook You a Vulnerability: Exploiting the Thermomix TM5 Related Work The Thermomix TM5 has previously drawn the attention of the security community, notably through research presented by Jean-Michel Besnard at SSTIC 2019 [1], which described a code execut

I love this kind of analysis 😍 Well done!
Exploiting the Thermomix.

Hey @synacktiv.com can you cook me a chocolate cake? ;-)

www.synacktiv.com/en/publicati...

16.07.2025 10:10 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Catching Smarter Mice with Even Smarter Cats | FortiGuard Labs Explore how AI is changing the cat-and-mouse dynamic of cybersecurity, from cracking obfuscation and legacy languages to challenging new malware built with Flutter, Rust, and Delphi.…

My blog post on how AI is reshaping malware and malware analysis is out: www.fortinet.com/blog/threat-...

Examples on Linux/Trigona, Linux/Prometei, Linux/Ladvix and Android/SpyLoan.

Enjoy.

#malware #r2ai #r2 #claude #delphi #trigona #rust #flutter

10.07.2025 14:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@cryptax is following 20 prominent accounts