Eloi Benoist-Vanderbeken
@elvanderb
Followers
5K
Following
1K
Media
22
Statuses
2K
Enthusiast reverse engineer of obfuscated and protected binaries. Exploit things @Synacktiv. Very occasionally on twitter.
France
Joined July 2011
See you at @Milipol_Paris 2025 ๐ ๐
November 18-21, 2025 ๐ Paris Nord Villepinte - Hall 4, Stand H063 (Forensic Zone) Meet our experts on site and discover how #REVELยทIO improves the efficiency and reliability of digital investigations ๐ https://t.co/uwas6u5ntT
0
2
5
๐ข NTLM reflection is dead, long live NTLM reflection: Story of an accidental Windows RCE by Wil (@wil_fri3d)
0
8
26
๐ฅ A few hours ago our experts took the stage at #DEFCON33, sharing cutting-edge research on SCCM exploitation and modern GPO attacks in Active Directory. Proud of the team! ๐ cc @kalimer0x00 @quent0x1 @wil_fri3d
2
23
98
That's a wrap on our Azure Intrusion for Red Teamers training at #BHUSA! 4 intense days from zero to Global Admin via Entra ID, M365, resources, DevOps, Intune & more ๐ฅ Huge thanks to all our participants and next stop: #HEXACON2025, Paris, Oct 6 ๐ซ๐ท
0
6
43
Not their best picture but definitely THE best hands-on iOS training! Come and see for yourself how Etienne and Quentin master iOS! โ ๏ธ Warning, risk of massive skills overflow โ ๏ธ
iOS for Security Engineers by Quentin Meffre (@0xdagger) & Etienne Helluy-Lafont https://t.co/o0ulZWXILO
0
1
11
๐จ Still a few seats left for our iOS for Security Engineers training at #HEXACON2025! 4โday hands-on labs to explore the iOS ecosystem and prepare for vulnerability research. ๐ Paris, Oct 6โ9 โก๏ธ
hexacon.fr
Offensive security conference organized by seasoned professionals, in the heart of Paris. 10-11th October 2025, save the date!
iOS for Security Engineers by Quentin Meffre (@0xdagger) & Etienne Helluy-Lafont https://t.co/o0ulZWXILO
0
4
13
Ever thought your kitchen appliance could harbor a persistent threat? We reverse-engineered the Thermomix TM5 and uncovered vulnerabilities allowing arbitrary code execution, persistence, and secure boot bypass. Discover our step-by-step breakdown! https://t.co/qDSoMYdHUK
synacktiv.com
Let Me Cook You a Vulnerability: Exploiting the Thermomix TM5
2
45
127
While performing security research on IoT control applications, @Areizen_ and @Anatharrr discovered critical vulnerabilities in the mobile app for the Eachine E58 drone. These flaws could potentially lead to remote code execution on the user's smartphone. https://t.co/pQNDWr5QPJ
synacktiv.com
From cheap IoT toy to your smartphone: Getting RCE by leveraging a
0
18
55
๐จ Still a few days to register for our Azure Intrusion for Red Teamers training at #BHUSA! Very hands-on, full kill chain from zero to Global Admin with stealth in mind. Secure your seat now! https://t.co/dvzRKQGUv9
0
17
19
If you are planning to learn about iOS, don't miss this training. Quentin and Etienne are exceptional researchers. No CVE โ no 0-days ๐๐
There are still seats available for our "iOS for Security Engineers" training at #HEXACON2025! Book it while it's hot ๐ Conference tickets are also still available if you register for a training.
0
7
18
The "Objective-C helper" IDA plugin presented during the @sth4ck talk "Demystifying Objective-C internals" given by @v1csec is now publicly available on GitHub at https://t.co/XVmzIkYwn6 The slides are also available on our website:
github.com
IDA helper plugin to reverse engineer Objective-C code - synacktiv/objc-helper
0
21
103
Don't miss our 2 trainings ๐ ๐ iOS for Security Engineers โ๏ธ Azure intrusion for red teamers
๐ Training ticket sales for HEXACON 2025 open TODAY at 2PM UTC+2! Limited spots available ๐ฅ https://t.co/vZUo5mOvyw
0
7
15
In iOS 18.4, Apple introduced a bug in dynamic symbol resolutions for some specific exports. @0xf4b took a long journey down a rabbit hole to understand its root cause. https://t.co/q03QTtw373
synacktiv.com
iOS 18.4 - dlsym considered harmful
2
61
160
PagedOut! #6 magazine is out! This edition features two articles from our ninjas: - Implicit Unicode behaviors in database string functions - Calling Rust from Python: A story of bindings Dive into their insights here:
pagedout.institute
Deeply technical zine. And it's free.
0
15
40
Hunters International RaaS group has claimed 280+ victims since Oct 2023. Check out our latest blog post on the TTPs they use, including SMOKEDHAM malvertising & ESXi ransomware with advanced obfuscation. #RaaS #CyberSecurity #ThreatAnalysis
https://t.co/uKTXH6lxog
synacktiv.com
Case Study: How Hunters International and friends target your
0
24
64
The 2025 training season is here! ๐ Join our best ninjas for 5-day sessions on pentesting, reverse-engineering, and forensics (in French). Check out all the dates and topics on our website:
synacktiv.com
Synacktiv
1
9
14
Better late than never... My Hexacon 2023 slides for "Finding and Exploiting an Old XNU Logic Bug" and the exploit code (WITH THE ANIMATED ASCII ART ๐ฅท๐ช๐!!!) are up https://t.co/Z3ktOkj6Gi /
github.com
Exploit code for CVE-2023-42914 / pwn2own Vancouver 2023 - synacktiv/CVE-2023-32413
6
45
158
Octoscan, our GitHub actions vulnerability scanner, is now available as a GitHub action! It will find vulnerabilities in new commits and pull requests, and upload it to GitHub as it now supports the SARIF file format! https://t.co/lEcnccw8H3
github.com
๐ฆ :octocat: A GitHub Action that performs a security scan of your GitHub Actions. - GitHub - synacktiv/action-octoscan: ๐ฆ A GitHub Action that performs a security scan of your GitHub Actions.
0
13
54