Marcel (@0ddc0de) 's Twitter Profile
Marcel

@0ddc0de

PostDoc @HexhiveEPFL working on mobile security.
CTF-Enthusiast @polygl0ts/@0rganizers. Former @shellphish and @fausecteam. Co-founder of @faustctf.

ID: 802089345847099392

calendar_today25-11-2016 09:59:36

70 Tweet

216 Followers

287 Following

blasty (@bl4sty) 's Twitter Profile Photo

Here we can see Anthropic's claude (Sonnet 3.7 model) talking to IDA pro to reverse engineer a CTF task I made for PotluckCTF, it does pretty well! It manages to get a grasp of the entire custom VM instruction set, file format, syscall interface etc.🤓 The MCP server is

blasty (@bl4sty) 's Twitter Profile Photo

looks like the AI + MCP-assisted reverse engineering hype train is gaining steam! 🚂✨ in just the past few days, we've seen: • itszn integrating MCP into Vector 35’s Binary Ninja (x.com/itszn13/status…) • Mx-Iris casually dropping his IDA MCP project, which I had to

hardwear.io (@hardwear_io) 's Twitter Profile Photo

🛠️ **Interested in building your own fuzzers to uncover vulnerabilities in proprietary Secure Monitor code?** Get hands-on with techniques to break into the most privileged layers of modern SoCs. Join us at #hardwear_ioUSA 2025 #TEE #Security hardwear.io/usa-2025/train…

hardwear.io (@hardwear_io) 's Twitter Profile Photo

ARM TrustZone-based TEEs have become the security architecture's backbone of many modern systems including, but not limited to, mobile and IoT devices. **Vulnerabilities still slip through the cracks like CVE-2019-20586, or CVE-2023-32835 ** Know more: hardwear.io/usa-2025/train…

eShard (@eshard) 's Twitter Profile Photo

We emulated iOS 14 in QEMU. Here’s how we did it: eshard.com/posts/emulatin… #reverseengineering #cybersecurity #iosdev

eShard (@eshard) 's Twitter Profile Photo

We sent one of us to scout the grounds of this year's Insomni'hack. From Android rollback attacks to AI-driven malware, here’s what stood out to us: eshard.com/posts/a-look-b…

We sent one of us to scout the grounds of this year's <a href="/1ns0mn1h4ck/">Insomni'hack</a>.
From Android rollback attacks to AI-driven malware, here’s what stood out to us: eshard.com/posts/a-look-b…
Zion Leonahenahe Basque (@mahal0z) 's Twitter Profile Photo

I'm proud to announce that myself and Ati Priya Bajaj have created the Workshop on Software Understanding and Reverse Engineering (SURE), which will be co-located at CCS 2025. sure-workshop.org Please follow our workshop account ACM SURE Workshop and RT it for visibility :).

BlackAlps (@blackalpsconf) 's Twitter Profile Photo

#BlackAlps25 CALL FOR PROPOSALS 📅Deadline July 31 ➡️ pretalx.com/blackalps-2025… Come to Yverdon-les-Bains (CH) on 20-21 November to present your latest cybersecurity research. 2 formats are available:👨‍⚕️regular talk (30mn) &👩‍🎓student talk (15mn for BSc/MSc graduates in 2025)

#BlackAlps25 CALL FOR PROPOSALS
đź“…Deadline July 31 
➡️ pretalx.com/blackalps-2025…
Come to Yverdon-les-Bains (CH) on 20-21 November to present your latest cybersecurity research.
2 formats are available:👨‍⚕️regular talk (30mn) &amp;👩‍🎓student talk (15mn for BSc/MSc graduates in 2025)
Raelize (@raelizecom) 's Twitter Profile Photo

In our hardwear.io talk we showed how to get EL3 code execution on the Google Nest WiFi Pro: raelize.com/upload/researc… We combined a #secureboot exploit, EM #faultinjection and #TEE knowledge to achieve code exec in the Secure Monitor...with a couple of unusual routes. Enjoy!

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Extracting Embedded MultiMediaCard (eMMC) contents in-system. ZDI researcher Dmitry Janushkevich details how to interact with an eMMC chip and notes some pitfalls you may encounter on the way. zerodayinitiative.com/blog/2025/6/18…

BOUALI BECHIR (@b3ch1r) 's Twitter Profile Photo

Practical example of leveraging write privilege achieved by EMFI to go from NS-EL1 to EL3. Great work from Raelize team especially on characterisation side and leveraging the right fault model to mount the attack youtu.be/ghqdhd2vpEw?si…

hardwear.io (@hardwear_io) 's Twitter Profile Photo

You asked, you signed up, you SOLD IT OUT 🙌🔥 Our hardware community keeps proving that growth never goes out of style. See you in training! Join Marcel at #hw_ioNL2025 Know More: hardwear.io/netherlands-20… #TEEsecurity #offensivesecurity #hardwaretraining

You asked, you signed up, you SOLD IT OUT 🙌🔥 Our hardware community keeps proving that growth never goes out of style. See you in training!

Join <a href="/0ddc0de/">Marcel</a> at #hw_ioNL2025 

Know More: hardwear.io/netherlands-20…

#TEEsecurity #offensivesecurity #hardwaretraining
hardwear.io (@hardwear_io) 's Twitter Profile Photo

Turns out isolation and confidentiality make for a surprisingly epic team sport—let the TEE adventures roll! 🤝 At #hw_ioNL2025, Marcel is leading the participants through the TrustZone jungle, slicing through vulnerabilities like seasoned explorers. 👉hardwear.io/netherlands-20…

Turns out isolation and confidentiality make for a surprisingly epic team sport—let the TEE adventures roll! 🤝

At #hw_ioNL2025, <a href="/0ddc0de/">Marcel</a> is leading the participants through the TrustZone jungle, slicing through vulnerabilities like seasoned explorers.

👉hardwear.io/netherlands-20…