Ajax Profile
Ajax

@commial

Followers
1K
Following
212
Media
17
Statuses
235

InfoSec R&D

Paris
Joined July 2010
Don't wanna be here? Send us removal request.
@commial
Ajax
11 years
#Miasm, the reverse engineering framework in Python, has a new home: !.Asm/Dis, IR translation, Emul, Symbolic exec….
Tweet card summary image
github.com
Reverse engineering framework in Python. Contribute to cea-sec/miasm development by creating an account on GitHub.
0
50
60
@commial
Ajax
8 months
RT @sstic: Nous sommes à la recherche de volontaires pour réaliser le challenge SSTIC 2025 !. Si vous êtes intéressé vous pouvez retrouver….
0
20
0
@commial
Ajax
1 year
Even if it works for some (old) commercial packers, it seems that nowadays malware authors prefer one-time & custom packers. So likely not that useful, but still fun to make 🤷.
0
0
2
@commial
Ajax
1 year
Little experiment about reusing Windows Defender built-in unpackers, mostly for fun (based on the very useful @taviso's loadlibrary)
Tweet media one
Tweet media two
Tweet media three
2
30
82
@commial
Ajax
1 year
RT @sstic: The SSTIC challenge 2024 is now opened and english friendly! You can find it here : Good luck!.
0
26
0
@commial
Ajax
2 years
RT @KensyAtMS: Do you wish Time Travel Debugging was faster and more lightweight? Our latest version lets you decide exactly what you want….
0
26
0
@commial
Ajax
2 years
RT @standa_t: Write up of the HVCI bypass vuln (CVE-2024-21305) with @aall86 !.
Tweet media one
0
115
0
@commial
Ajax
2 years
RT @ANSSI_FR: L’@ANSSI_FR lance #Hackropole 🏛 une plateforme regroupant la quasi-totalité des épreuves du France Cybersecurity Challenge #F….
0
172
0
@commial
Ajax
2 years
RT @taviso: First big result from our new CPU research project, a use-after-free in AMD Zen2 processors! 🔥 AMD have just released updated m….
0
663
0
@commial
Ajax
2 years
RT @chompie1337: Honored to be invited to speak at @sstic today. Stream my talk “Deep Attack Surfaces, Shallow Bugs” here: .
0
37
0
@commial
Ajax
2 years
RT @sstic: La billetterie de SSTIC 2023 ouvrira demain, le 13 avril à 10h00. Retrouvez les instructions sur
0
14
0
@commial
Ajax
2 years
RT @monoxgas: A short🧵 detailing a Kerberos LPE I discovered while working with @tiraniddo on our BlackHat research. .
0
121
0
@commial
Ajax
2 years
RT @sstic: Le challenge sera publié ce vendredi 31 mars à 19h00, heure de Paris à l'adresse suivante : À vos marque….
0
27
0
@commial
Ajax
2 years
RT @sstic: Le programme est disponible : !.La billetterie ouvrira dans les prochaines semaines.
0
36
0
@commial
Ajax
3 years
RT @IvreRocks: If you use @obsdmd for your #pentest / #redteam or #threatintel notes, you might be interested in the IVRE community plugin….
0
4
0
@commial
Ajax
3 years
RT @sstic: Comment bien commencer la nouvelle année ? En soumettant à SSTIC ! Vous avez jusqu'au 30 janvier. Toutes les infos : https://t.c….
0
22
0
@commial
Ajax
3 years
RT @dj_s2w: My first blog post about analyzing windows defender is out! Fuzzing the Shield: CVE-2022–24548 -
Tweet card summary image
medium.com
Author: Daejin Lee, Seunghoe Kim, Donguk Kim, Eugene Jang
0
180
0
@commial
Ajax
3 years
RT @citronneur: The results are out! . We are very honoured to have won first place🥇in the Hex-Rays plugin contest 2022 🎉.Our entry was "t….
0
21
0
@commial
Ajax
3 years
New release of featuring more API wrapping (thanks @citronneur), and new examples: coverage (LightHouse compatible) and a trace producer for the awesome Tenet plugin (cc @gaasedelen)
Tweet media one
Tweet media two
1
16
54
@commial
Ajax
3 years
RT @Intel80x86: After 3 years of development, today we proudly announce & celebrate the first release of a new hypervisor-based user-mode &….
0
285
0