mhoste (@mhoste1) 's Twitter Profile
mhoste

@mhoste1

Security engineer at @FuzzingLabs

ID: 1524423839341547520

calendar_today11-05-2022 16:19:12

31 Tweet

142 Followers

144 Following

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Excellent series for learning a bit more about Linux kernel internals and exploitation techniques Credits Dang (midas) Le Part 1: lkmidas.github.io/posts/20210123… Part 2: lkmidas.github.io/posts/20210128… Part 3: lkmidas.github.io/posts/20210205… #Linux

Excellent series for learning a bit more about Linux kernel internals and exploitation techniques
Credits <a href="/_lkmidas/">Dang (midas) Le</a>

Part 1: lkmidas.github.io/posts/20210123…
Part 2: lkmidas.github.io/posts/20210128…
Part 3: lkmidas.github.io/posts/20210205…

#Linux
Isis (@0x1sis) 's Twitter Profile Photo

A tool to unstrip Rust binaries on Linux in python for static analysis made by Hell Diner, worth a look :) github.com/h311d1n3r/Cerb…

Root-Me (@rootme_org) 's Twitter Profile Photo

Our contributors are on fire🔥: we've got another 2 new challenges for you to discover, this time in the Web-Client category 🎉:root-me.org/en/breve/New-c… Thanks to the authors: Ruulian, mhoste, Lexter 👏👏👏!

Our contributors are on fire🔥: we've got another 2 new challenges for you to discover, this time in the Web-Client category 🎉:root-me.org/en/breve/New-c…
Thanks to the authors: <a href="/Ruulian_/">Ruulian</a>, <a href="/mhoste1/">mhoste</a>, <a href="/lxt33r/">Lexter</a> 👏👏👏!
Hell Diner (@dinerhell) 's Twitter Profile Photo

Cerberus v1.2 is out ! The tool can now recover symbols of stripped Go binaries in addition to Rust. The rate is still of ~90%. 🔥I am open to any feedback🔥 github.com/h311d1n3r/Cerb…

thehackerscrew (@thehackerscrew1) 's Twitter Profile Photo

This weekend we played HITCON CTF 2023. The challenges were amazing and we finished 13th. Congratulations to Water Paddler and perfect blue for absolutely nailing the scoreboard 💪

This weekend we played <a href="/HacksInTaiwan/">HITCON</a> CTF 2023. The challenges were amazing and we finished 13th. Congratulations to <a href="/Water_Paddler/">Water Paddler</a> and <a href="/pb_ctf/">perfect blue</a> for absolutely nailing the scoreboard 💪
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Understanding the internals of #Rust and learn how Rust code maps to assembly Collection of blog posts by EventHelix) eventhelix.com/rust/ #rustlang #reverseengineering

Understanding the internals of #Rust and learn how Rust code maps to assembly
Collection of blog posts by <a href="/eventhelix/">EventHelix</a>)

eventhelix.com/rust/

#rustlang #reverseengineering
Nofix (@n0fix) 's Twitter Profile Photo

I just wrote a blog post and made a tool about my journey into recovering symbols from KrustyLoader, a malware written in rust ekt0 from Synacktiv analyzed not long ago. Check it out if you are into rust reverse engineering ! 😁 nofix.re/posts/2024-11-…

Laluka@OffenSkill (@thelaluka) 's Twitter Profile Photo

Hi friendz ! 🧙‍♂️ - Prochain Stream ce Mardi 18 Juin à 21h ! 🕯️ - Topic : Reversing RUST Vs CPP Vs C ! 🤔 On part sur 2h+ sur quelques bases, les différences fondamentales entre les technologies proposées, et les approches de nos différents invités, à savoir Nofix, mhoste, et

Nofix (@n0fix) 's Twitter Profile Photo

Just wrote a new blog post about rust symbol recovery, this time targeting cross-compiled targets ! Here is the blog post: nofix.re/posts/2024-23-… I also updated rustbinsign/rustbininfo to identify and handle MinGW targets accordingly.

Meysam (@r00tkitsmm) 's Twitter Profile Photo

r00tkitsmm.github.io/fuzzing/2024/1… TL;DR I Implemented a super reliable macOS kernel binary rewriting to instrument any KEXT or XNU at BB or edge level.

Lexter (@lxt33r) 's Twitter Profile Photo

At FuzzingLabs , with mhoste we found vulnerabilities on an EVM, we share with you an article about one of the vulnerabilities found. fuzzinglabs.com/evm-arithmetic…

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

‼️ FuzzingLabs will be at REcon 2025 in Montreal this June Join us for 3 hands-on, in-depth trainings from 23rd–26th of June 2025. 🔍 Reversing Modern Binaries : Practical Rust & Go Analysis: fuzzinglabs.com/recon-2025-rev… 🛠 Fuzzing Windows Userland Applications:

‼️ FuzzingLabs will be at <a href="/reconmtl/">REcon</a> 2025 in Montreal this June

Join us for 3 hands-on, in-depth trainings from 23rd–26th of June 2025.

🔍 Reversing Modern Binaries : Practical Rust &amp; Go Analysis: fuzzinglabs.com/recon-2025-rev…

🛠 Fuzzing Windows Userland Applications:
Hell Diner (@dinerhell) 's Twitter Profile Photo

🔥Introducing Arion🔥 A high-performance C++ framework for emulating executable binaries. Based on Unicorn and inspired by Qiling, Arion offers an easy-to-use interface and super low execution times making it a great ally for fuzzing or other applications. github.com/h311d1n3r/Arion

🔥Introducing Arion🔥
A high-performance C++ framework for emulating executable binaries.
Based on Unicorn and inspired by Qiling, Arion offers an easy-to-use interface and super low execution times making it a great ally for fuzzing or other applications.
github.com/h311d1n3r/Arion
REcon (@reconmtl) 's Twitter Profile Photo

Come learn how to Reverse Modern Binaries on June 23-26. Rust binaries (Days 1-2) and Golang binaries (Days 3-4) by Daniel Frederic & mhoste from FuzzingLabs. For more information visit recon.cx/2025/training.… #reverseengineering #rust #golang

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

Uncovering Hidden Threats in Ethereum Virtual Machines 🚨 At #Zer0Con2025, we exposed critical vulnerabilities in Ethereum Virtual Machines (EVMs) using fuzzing. Here’s what you need to know 🧵👇 #Ethereum #EVM #Fuzzing #BlockchainSecurity

Uncovering Hidden Threats in Ethereum Virtual Machines 🚨

At #Zer0Con2025, we exposed critical vulnerabilities in Ethereum Virtual Machines (EVMs) using fuzzing. Here’s what you need to know 🧵👇

#Ethereum #EVM #Fuzzing #BlockchainSecurity