Kylm (@0xkylm) 's Twitter Profile
Kylm

@0xkylm

reverse fuzzing and maldev / internals enjoyer
at @FuzzingLabs
20yo

ID: 1501965411029557249

calendar_today10-03-2022 16:57:28

123 Tweet

237 Followers

957 Following

Maurice Heumann (@momo5502) 's Twitter Profile Photo

I spent the last 5 months reverse engineering Denuvo's protection in Hogwarts Legacy and finally managed to bypass it using more than 2000 hooks 😂 One of the toughest challenges of my life. Here's my blog post about it: momo5502.com/posts/2024-03-…

Chetan Nayak (Brute Ratel C4 Author) (@ninjaparanoid) 's Twitter Profile Photo

Watching people tweet they bypassed a certain EDR is just cringe at this point. When you ask them what did they bypass, they dont know what. So let me take you back to school... Executing OpenSource tool is not a bypass. An EDR employs several mechanisms for detection. Getting a

Kylm (@0xkylm) 's Twitter Profile Photo

Hexacon was awesome , and I was able to learn a lot of stuff and be more motivated in exploit dev, I would like to thanks again André Moulu for the free ticket (even with the reduced price it's really expensive for students) and I hope I will come next year #HEXACON2024

ESN'HACK (@esnhack) 's Twitter Profile Photo

[📣ANNONCE CONFÉRENCES📣] Vous l'attendiez, le voici : le programme des conférences de samedi ! Un grand merci à nos speakers, car ils contribuent au partage de connaissances et perpétuent l'esprit que nous souhaitons faire vivre.

[📣ANNONCE CONFÉRENCES📣]

Vous l'attendiez, le voici : le programme des conférences de samedi !

Un grand merci à nos speakers, car ils contribuent au partage de connaissances et perpétuent l'esprit que nous souhaitons faire vivre.
Kylm (@0xkylm) 's Twitter Profile Photo

With some friends shard7 and @abel_theo3 We wrote a pretty cool linux rootkit. With an hypervisor from scratch and eBPF programs. Still a work-in-progress! Check it out: github.com/DualHorizon/bl…

POC_Crew 👨‍👩‍👦‍👦 (@poc_crew) 's Twitter Profile Photo

[Zer0Con2024] TRAINING "Fuzzing Windows Userland Applications" by Nabih Benazzouz & Kylian Boulard De Pouqueville 🗓️Date: 7th April ~ 9th April 2025 (3 DAYS) - Fairmont Ambassador Seoul, South Korea Sign up: forms.gle/LxRxNXr3JeJLa1… #Zer0Con2025

[Zer0Con2024] TRAINING

"Fuzzing Windows Userland Applications" by Nabih Benazzouz & Kylian Boulard De Pouqueville

🗓️Date: 7th April ~ 9th April 2025 (3 DAYS)
- Fairmont Ambassador Seoul, South Korea

Sign up: forms.gle/LxRxNXr3JeJLa1…

#Zer0Con2025
Rtl Dallas (@rtldallas) 's Twitter Profile Photo

CobaltStrike BOF template to make a synthetic stack frame with a randomly chosen gadget for each call. Additionally, a project for remote shellcode injection is included, providing an example of how to use it github.com/NtDallas/Draugr

Kylm (@0xkylm) 's Twitter Profile Photo

With DaemonOnUnix we found a pretty fun "feature" in this "anti-rootkit" that leaves an ioctl with any_access that permits any process with MediumIntegrity to AARW virtual and physical addr. Not a vuln but a strange feature that permits lpe. github.com/BlackINT3/Open…

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

‼️ FuzzingLabs will be at REcon 2025 in Montreal this June Join us for 3 hands-on, in-depth trainings from 23rd–26th of June 2025. 🔍 Reversing Modern Binaries : Practical Rust & Go Analysis: fuzzinglabs.com/recon-2025-rev… 🛠 Fuzzing Windows Userland Applications:

‼️ FuzzingLabs will be at <a href="/reconmtl/">REcon</a> 2025 in Montreal this June

Join us for 3 hands-on, in-depth trainings from 23rd–26th of June 2025.

🔍 Reversing Modern Binaries : Practical Rust &amp; Go Analysis: fuzzinglabs.com/recon-2025-rev…

🛠 Fuzzing Windows Userland Applications:
REcon (@reconmtl) 's Twitter Profile Photo

Come learn Windows Userland Applications Fuzzing with Patrick Ventuzelo and Kylm from FuzzingLabs on June 23-26 at Recon Montreal. For more info visit recon.cx/2025/training.…

POC_Crew 👨‍👩‍👦‍👦 (@poc_crew) 's Twitter Profile Photo

#Zer0Con2025 is getting closer, and the training sessions are going very smoothly. 👥 Nabih Benazzouz(Nabih) & Kylian Boulard De Pouqueville(Kylm), “Fuzzing Windows Userland Applications” from FuzzingLabs

#Zer0Con2025 is getting closer, and the training sessions are going very smoothly.

👥 Nabih Benazzouz(<a href="/Raefko/">Nabih</a>) &amp; Kylian Boulard De Pouqueville(<a href="/0xKylm/">Kylm</a>), “Fuzzing Windows Userland Applications” from <a href="/FuzzingLabs/">FuzzingLabs</a>
POC_Crew 👨‍👩‍👦‍👦 (@poc_crew) 's Twitter Profile Photo

[#Zer0Con2025] Welcome Dinner with Early birds 🍽️ "Before we shared code, we shared the table" Chilling with some Korean rice wine and local foods 😋

[#Zer0Con2025] Welcome Dinner with Early birds 🍽️

"Before we shared code, we shared the table"

Chilling with some Korean rice wine and local foods 😋
Kylm (@0xkylm) 's Twitter Profile Photo

I would like to thanks POC_Crew 👨‍👩‍👦‍👦 for Zer0CON the event was awesome. I'm glad to discover and talk with lots of interesting security researchers. Hope I'll be able to give another training or a talk next year.