mhoste Profile
mhoste

@mhoste1

Followers
152
Following
269
Media
2
Statuses
33

Security engineer at @FuzzingLabs

Joined May 2022
Don't wanna be here? Send us removal request.
@mhoste1
mhoste
22 days
RT @FuzzingLabs: Day 3 (out of 4) of our "Reversing Modern Binaries" training at REcon Montreal is kicking off!.👨‍🏫The energy and insights….
0
9
0
@mhoste1
mhoste
2 months
RT @FuzzingLabs: Uncovering Hidden Threats in Ethereum Virtual Machines 🚨. At #Zer0Con2025, we exposed critical vulnerabilities in Ethereum….
0
13
0
@mhoste1
mhoste
3 months
RT @POC_Crew: [#Zer0Con2025]. 🎙️ SPEAKER Highlight: @lxt33r / @mhoste1. "Ethereum's Achilles' Heel: Attacking and Fuzzing EVMs for Fun (and….
0
10
0
@mhoste1
mhoste
4 months
RT @DinerHell: 🔥Introducing Arion🔥.A high-performance C++ framework for emulating executable binaries. Based on Unicorn and inspired by Qil….
0
21
0
@mhoste1
mhoste
4 months
RT @reconmtl: Come learn how to Reverse Modern Binaries on June 23-26. Rust binaries (Days 1-2) and Golang binaries (Days 3-4) by Daniel Fr….
0
6
0
@mhoste1
mhoste
4 months
See you there 😎.
@POC_Crew
POC_Crew 👨‍👩‍👦‍👦
4 months
[#Zer0Con2025] - SPEAKER 4⃣. 👬 Bryton Bernard & Mathieu Hoste from @FuzzingLabs - Ethereum's Achilles' Heel : Attacking and Fuzzing EVMs for FUN(and Profits)
Tweet media one
0
0
6
@mhoste1
mhoste
5 months
RT @FuzzingLabs: ‼️ FuzzingLabs will be at @reconmtl 2025 in Montreal this June. Join us for 3 hands-on, in-depth trainings from 23rd–26th….
0
9
0
@mhoste1
mhoste
8 months
RT @lxt33r: At @FuzzingLabs , with @mhoste1 we found vulnerabilities on an EVM, we share with you an article about one of the vulnerabilit….
0
2
0
@mhoste1
mhoste
8 months
RT @R00tkitSMM: TL;DR I Implemented a super reliable macOS kernel binary rewriting to instrument any KEXT or XNU at….
0
195
0
@mhoste1
mhoste
1 year
RT @N0Fix: Just wrote a new blog post about rust symbol recovery, this time targeting cross-compiled targets !. Here is the blog post: http….
0
32
0
@mhoste1
mhoste
1 year
RT @TheLaluka: Hi friendz ! 🧙‍♂️. - Prochain Stream ce Mardi 18 Juin à 21h ! 🕯️.- Topic : Reversing RUST Vs CPP Vs C ! 🤔. On part sur 2h+ s….
0
2
0
@mhoste1
mhoste
1 year
RT @N0Fix: I just wrote a blog post and made a tool about my journey into recovering symbols from KrustyLoader, a malware written in rust @….
0
26
0
@mhoste1
mhoste
2 years
RT @LiveOverflow: Web Security vs. Binary Exploitation
0
2K
0
@mhoste1
mhoste
2 years
RT @0xor0ne: Understanding the internals of #Rust and learn how Rust code maps to assembly.Collection of blog posts by @eventhelix). https:….
0
116
0
@mhoste1
mhoste
2 years
RT @thehackerscrew1: This weekend we played @HacksInTaiwan CTF 2023. The challenges were amazing and we finished 13th. Congratulations to @….
0
5
0
@mhoste1
mhoste
2 years
RT @2ourc3: New article: Exploring Grey-Box Fuzzing of Closed-Source Windows Binaries ! . =>
0
112
0
@mhoste1
mhoste
2 years
RT @DinerHell: Cerberus v1.2 is out ! The tool can now recover symbols of stripped Go binaries in addition to Rust. The rate is still of ~9….
0
46
0
@mhoste1
mhoste
2 years
Le tool qui fait gagner un temps fou en ctf.
@0x1sis
Isis
2 years
A tool to unstrip Rust binaries on Linux in python for static analysis made by @DinerHell, worth a look :).
0
0
3
@mhoste1
mhoste
2 years
RT @0x1sis: A tool to unstrip Rust binaries on Linux in python for static analysis made by @DinerHell, worth a look :). .
0
48
0
@mhoste1
mhoste
2 years
RT @rootme_org: Our contributors are on fire🔥: we've got another 2 new challenges for you to discover, this time in the Web-Client category….
0
6
0