βπ₯οΈβ cesi n'est pas une named pipe
K7 Antivirus: Named pipe abuse, registry manipulation and privilege escalation.
A story of endpoint post-exploitation by Lucas Laise
blog.quarkslab.com/k7-antivirus...
@quarkslab.bsky.social
Securing every bit of your data https://quarkslab.com
βπ₯οΈβ cesi n'est pas une named pipe
K7 Antivirus: Named pipe abuse, registry manipulation and privilege escalation.
A story of endpoint post-exploitation by Lucas Laise
blog.quarkslab.com/k7-antivirus...
We've been a bit excited about this one.
We are excited and honored to have partnered with Bitcoin, brink, Chaincode Labs, and @quarkslab.bsky.social to collaborate on a security audit of Bitcoin Core. This was Bitcoin Core's first external audit.
Read more at our blog: ostif.org/bitcoin-core...
Quarkslab engineers Robin David, Mihail Kirov and Kaname just completed the first public security audit of Bitcoin Core, led by
@ostifofficial.bsky.social and funded by Brink.dev
Details on the blog post:
blog.quarkslab.com/bitcoin-core...
Congrats to developers for such software masterpiece !
We are pleased to announce that the KubeVirt Security Audit report has been published, in collaboration with @quarkslab.bsky.social and @ostifofficial.bsky.social
Check out our blog post for all the details: kubevirt.io/2025/Announc...
KubeVirt is open source virtualization technology for Kubernetes.
Recently we worked with the @kubevirt team on a security audit sponsored by @OSTIFofficial π
Read a summary of our findings and find the full report here:
blog.quarkslab.com/kubevirt-sec...
Our 2025-2026 internship season has started.
Check out the list of openings and apply for fun and knowledge!
blog.quarkslab.com/internship-offers-for-the-2025-2026-season.html
From kernel oops to kernel exploit: How two little bugs (CVE-2025-23330, CVE-2025-23280) in #NVIDIA open GPU #Linux driver can lead to full system compromise.
Full technical breakdown inside, #vmalloc exploitation technique included!
blog.quarkslab.com/nvidia_gpu_k...
Unsigned FTW!
Finding a buggy driver is one thing, abusing it is anotherπ§
In his latest blog post, Luis Casvella shows you how BYOVD can be used as a Reflective Rootkit Loader ! π
β‘οΈ blog.quarkslab.com/exploiting-l...
Signal: Yo dawg! I heard you liked ratchets, so we added a ratchet to our Double Ratchet.
Quantum computers are not quite here yet, but now's the time to get ready. After updating their protocol in 2023, @signal.org is now proposing a post-quantum version of their Double Ratchet for message encryption.
Let's see what Signal looks like now!
blog.quarkslab.com/triple-threa...
Brand new paper with Roxane Cohen, Robin David (both from @quarkslab.bsky.social ) and Florian Yger on obfuscation detection in binary code doi.org/10.1007/s411... We show that carefully selected features can be leveraged by graph neural networks to outperform classical solutions.
30.09.2025 17:03 β π 12 π 7 π¬ 1 π 1RW physical memory pages with a side of LSTAR MSR overwrite? YOLO!
BYOVD is a well-known technique commonly used by threat actors to kill EDR πͺ
However, with the right primitives, you can do much more.
Find out how Luis Casvella found and exploited 4 vulns (CVE-2025-8061) in a signed Lenovo driver.
π
blog.quarkslab.com/exploiting-l...
RTFM they say but if you read the manual and copy code examples from it you may inadvertently introduce vulns in your code π
In April we audited the PHP code. Now we followed up with a review of the code snippets in PHP documentation and found 81 issues π
blog.quarkslab.com/security-rev...
Yo dawg, I heard you like Improved Bounds Checking So I improved the bound checks of the bound checks
The two bytes that make size matter:
Reverse engineering Apple's iOS 0-click CVE-2025-43300 improved bounds checking fix, by Madimodi Diawara
blog.quarkslab.com/patch-analys...
The Barbhack 2025 logo m000000
Hacking & Barbecue in the south of France. What could possibly be better?
Barbhack starts this Saturday in Toulon and we're giving away a ticket to a student nearby looking to live the experience
Send us a Chat msg with your name and school
We will notify the winner tonight
www.barbhack.fr/2025/fr/
πEver heard of ControlPlane, software to help you automate tasks on macOS? Turns out, it might also help you become root.
Oops! π± @coiffeur0x90 found a Local Privilege Escalation vulnerability.
Read before someone automates your admin rights
π blog.quarkslab.com/controlplane...
You finally pwned the Holy Confluence server. What now? Create a user? Reset a password?
π¨Best way to trigger an alert
What if you craft your own Personal Access Token π for the Admin account ?
Find out how in this blog post by Quarkslab's Red Teamer YV
blog.quarkslab.com/a-story-abou...
The leHack conference (@le-hack.bsky.social) starts tomorrow at the CitΓ© des Sciences et de lβIndustrie in Paris.
We will be there to meet with peers and friends.
3 technical talks, a cool challenge & our famous Car in a Box to play with.
Come and say hi at booth 20.
Full program here:
lehack.org
A Go gopher surfing over a Wireshark shark
Are you a network protocol reverse engineer? Tired of writing Wireshark plugins in memory unsafe or esoteric languages named after celestial objects?
Now you can do it in a few lines of Go, Python or Rust with Wirego.
Benoit Girard explains how here:
blog.quarkslab.com/getting-star...
Attention β¨WomenAtSSTICβ¨
We meet at 18:00 today at L'Equinoxe:
3 Place des Lices, 35000 Rennes
See you there!
#sstic2025
Are you a cyber professional, or a future one, coming to #sstic2025 next week?
Come to β¨WomenATssticβ¨, an informal and unofficial friendly meetup on Wednesday, June 4th at 6 pm.
We will reserve a bar/cafΓ© near the Halle Martenot. Register here:
framadate.org/hH2t9FcRtgEG...
Good morning Singapore!
The amazing Off by One Conference 2025 starts today.
If you are attending don't miss Fred Raynal's (our fearless CEO) keynote at 9:35am:
"Spyware for rent & the world of offensive cyber"
The full agenda is available here:
offbyone.sg/agenda
Julio Loayza Meneses talking about Crypto Condor at RWC2005 Paris The top bird of crypto implemetation testing
Quarkslab was glad to sponsor the Real World Cryptography Paris Meetup 4 hosted by @Ledger last night.
Julio Loayza Meneses talked about crypto-condor, our open source tool to test cryptography implementations.
You can learn more about it here:
quarkslab.github.io/crypto-condo...
Proxybloby, the read teamer's mascot that will byte your SOCKS if left alone in your internal network
Look at those cute little blobs in your internal network. They look harmless, but how about the one carrying SOCKS?
It's ProxyBlob, a reverse proxy over Azure.
Check out Alexandre Nesic's article on how it came to exist after an assumed breach mission ‡οΈ
π blog.quarkslab.com/proxyblobing...
a TOCTOU bug in Moodle's core
While casually reading Moodle's code Mathieu Farrell found a SSRF bug exploitable by any authenticated user.
Fun twist? This vuln matches exactly the example Orange Tsai presented at Black Hat 2017.
Real life imitates conference slides π
Details here:
blog.quarkslab.com/auditing-moo...
We are so excited to announce the publication of our audit of PHP core! This work was made possible through a collaboration between OSTIF, @thephpf.bsky.social, and @quarkslab.bsky.social with funding provided by @sovereign.tech. For the report and further links, check out ostif.org/php-audit-co...
10.04.2025 19:12 β π 5 π 3 π¬ 0 π 0We are pleased to announce the completion of security audit of PHP core!
Executed by @quarkslab.bsky.social in partnership with @ostifofficial.bsky.social and commissioned by the @sovereign.tech.
Learn more: thephp.foundation/blog/2025/04...
Quarkslab audited PHP-SRC, the open source interpreter of PHP.
The security audit, sponsored by @ostifofficial.bsky.social with funding from @sovereign.tech, aimed at strengthening the project's security ahead of the upcoming PHP 8.4 release.
Here's what we found:
blog.quarkslab.com/security-aud...
There is a small bug in the signature verification of OTA packages in the Android Open Source Framework.
Official builds doing normal double verification of packages are not vulnerable but OEMs and third party apps may be.
JΓ©rΓ©my Jourdois explains it here:
blog.quarkslab.com/aosp_ota_sig...
Who let the RATs in? why, CCleaner v1 did.
New GUI or root access? Choose wisely!
Exploiting a Local Privilege Escalation vulnerability in CCleaner version 1 for MacOS, by @Coiffeur0x90
blog.quarkslab.com/ccleaner_lpe...
A CTF challenge in PHP, what could possibly not be a RCE?
Next week at the Hack The Box 0x4d meetup in Lille, France @rayanle.cat will talk about PwnShop, the challenge he prepared for the PwnMe CTF 2025 and how he accidentally discovered a RCE 0day while doing so.
Join him next Monday at Campus Cyber Hauts-the-France:
www.meetup.com/hack-the-box...