Lexter (@lxt33r) 's Twitter Profile
Lexter

@lxt33r

Blockchain Security Researcher at @FuzzingLabs

ID: 1600801329445801984

linkhttps://lextersec.fr calendar_today08-12-2022 10:35:59

954 Tweet

322 Followers

671 Following

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

🚨 Our latest blog post dives into how fuzzing could have prevented the zkLend hack by exposing a critical flaw in the safe_decimal_math library 🧵

🚨 Our latest blog post dives into how fuzzing could have prevented the zkLend hack by exposing a critical flaw in the safe_decimal_math library 🧵
POC_Crew 👨‍👩‍👦‍👦 (@poc_crew) 's Twitter Profile Photo

[#Zer0Con2025] - SPEAKER 4⃣ 👬 Bryton Bernard & Mathieu Hoste from FuzzingLabs - Ethereum's Achilles' Heel : Attacking and Fuzzing EVMs for FUN(and Profits)

[#Zer0Con2025] - SPEAKER 4⃣

👬 Bryton Bernard &amp; Mathieu Hoste from <a href="/FuzzingLabs/">FuzzingLabs</a> - Ethereum's Achilles' Heel : Attacking and Fuzzing EVMs for FUN(and Profits)
Ectario (@ectari0) 's Twitter Profile Photo

Heyyy! I've recently created a repository compiling some articles and write-ups I've written. If anyone is interested in cryptography or blockchain, you might find it interesting! Of course, I'll add new materials over time; this is not its final form ^^ github.com/Ectario/articl…

Hell Diner (@dinerhell) 's Twitter Profile Photo

🔥Introducing Arion🔥 A high-performance C++ framework for emulating executable binaries. Based on Unicorn and inspired by Qiling, Arion offers an easy-to-use interface and super low execution times making it a great ally for fuzzing or other applications. github.com/h311d1n3r/Arion

🔥Introducing Arion🔥
A high-performance C++ framework for emulating executable binaries.
Based on Unicorn and inspired by Qiling, Arion offers an easy-to-use interface and super low execution times making it a great ally for fuzzing or other applications.
github.com/h311d1n3r/Arion
POC_Crew 👨‍👩‍👦‍👦 (@poc_crew) 's Twitter Profile Photo

#Zer0Con2025 is getting closer, and the training sessions are going very smoothly. 👥 Nabih Benazzouz(Nabih) & Kylian Boulard De Pouqueville(Kylm), “Fuzzing Windows Userland Applications” from FuzzingLabs

#Zer0Con2025 is getting closer, and the training sessions are going very smoothly.

👥 Nabih Benazzouz(<a href="/Raefko/">Nabih</a>) &amp; Kylian Boulard De Pouqueville(<a href="/0xKylm/">Kylm</a>), “Fuzzing Windows Userland Applications” from <a href="/FuzzingLabs/">FuzzingLabs</a>
FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

Haha even more when it’s a wormable RCE on the nodes which allow us to basically do everything we want from network shutdown to extract nodes private keys 🔥

Patrick Ventuzelo (@pat_ventuzelo) 's Twitter Profile Photo

Always a pleasure to welcomed at offensivecon 👌 This week will be intense! - 4 day browser fuzzing training - Conference & talks - Spend time with FuzzingLabs team - Drink beer with friends! - Maybe pwn2own 🔥 Thanks Binary Gecko ! 🙏

Always a pleasure to welcomed at <a href="/offensive_con/">offensivecon</a> 👌

This week will be intense!
- 4 day browser fuzzing training
- Conference &amp; talks
- Spend time with <a href="/FuzzingLabs/">FuzzingLabs</a> team
- Drink beer with friends!
- Maybe pwn2own 🔥

Thanks <a href="/Binary_Gecko/">Binary Gecko</a> ! 🙏
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Boom! Mohand Acherir & Patrick Ventuzelo (@pat_ventuzelo) of FuzzingLabs (@fuzzinglabs) kick off Day Two in style by demonstrating their exploit of #NVIDIA Triton. They're off to the disclosure room to see if their exploit is unique. #Pwn2Own #P2OBerlin

ACCEIS (@acceis) 's Twitter Profile Photo

#ACCESSGRANTED J-1 🤗 MAJ du programme ! RDV Le Poool x La French Tech Rennes St-Malo, dès 18h demain au 2 Rue de la Mabilais - 35000 Rennes. Et pour ceux qui ne pourront pas se déplacer jusqu'à Rennes, retrouvez les conférences en LIVE 🔴 sur le twitch de Laluka@OffenSkill 😉

#ACCESSGRANTED J-1 🤗 MAJ du programme ! RDV <a href="/Le_Poool/">Le Poool x La French Tech Rennes St-Malo</a>, dès 18h demain au 2 Rue de la Mabilais - 35000 Rennes. Et pour ceux qui ne pourront pas se déplacer jusqu'à Rennes, retrouvez les conférences en LIVE 🔴 sur le twitch de <a href="/TheLaluka/">Laluka@OffenSkill</a> 😉
FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

🔍 Android obfuscation ≠ protection. 🤖 We let an LLM-powered CLI loose on nasty APKs — and it turned byte-code spaghetti into plain English in minutes. 🧵

🔍 Android obfuscation ≠ protection. 🤖

We let an LLM-powered CLI loose on nasty APKs — and it turned byte-code spaghetti into plain English in minutes. 🧵
FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

What powers BLS signatures, zk-SNARKs & identity-based encryption? 👉 Pairing-based cryptography. Let’s unpack it. 🧵