DateTue 07 October 2025
AuthorAngèle Bossuat
Category Cryptography

Signal recently announced the introduction of another layer of post-quantum cryptography to their protocol, this time in their ratcheting mechanism. Let's take a look!

DateTue 23 September 2025
AuthorLuis Casvella
Category Pentest

Bring Your Own Vulnerable Driver (BYOVD) is a well-known post-exploitation technique used by adversaries. This blog post is part of a series. We will see how to abuse a vulnerable driver to gain access to Ring-0 capabilities. In this first post we describe in detail the exploitation of vulnerabilities found in a signed Lenovo driver on Windows.

DateMon 22 September 2025
AuthorsMihail Kirov,Jacques Ricard,Ramtine Tofighi Shirazi
Category Software

TheOpen Source Technology Improvement Fund, Inc., engaged with Quarkslab to perform a security audit of the code snippets inthe English version of PHP documentation, focused on some specific pages.

DateThu 04 September 2025
AuthorMadimodi Diawara
Category Vulnerability

On August 20th, Apple released an out-of-band security fix for its main operating systems. This patch allegedly fixes CVE-2025-43300,an out-of-bounds write,addressed with improved bounds checking in the ImageIO framework. In this blog post we provide a root cause analysis of the vulnerability.

DateTue 15 July 2025
AuthorMathieu Farrell
Category Vulnerability

A technical exploration of Local Privilege Escalation Vulnerability in ControlPlane on macOS.

DateThu 03 July 2025
AuthorYV
Category Pentest

During a Red Team engagement, we compromised an AWS account containing a Confluence instance hosted on an EC2 virtual machine. Although we fully compromised the machine hosting the Confluence instance, we did not have valid credentials to log in but were able to interact with the underlying database. This led us to study the structure of the Confluence database and the mechanism for generating API tokens.

DateTue 10 June 2025
AuthorBenoit Girard
Category Software

An introduction to Wirego, a tool for Wireshark plugin development

DateTue 29 April 2025
AuthorAlexandre Nesic
Category Pentest

During an assumed breach ops via a virtual desktop interface, we discovered a wildcard allow firewall rule for the Azure Blob Storage service. We proved that even with restrictions in place, it was still possible to reach the Internet. Afterwards, we thought of abusing this firewall misconfiguration (recommended by Microsoft) in a much more useful way. To demonstrate that I built a SOCKS5 proxy that uses blobs to tunnel traffic to the target's internal network.

DateTue 22 April 2025
AuthorMathieu Farrell
Category Pentest

The following article explains how, during an audit, we examined Moodle (v4.4.3) and found ways of bypassing all the restrictions preventing SSRF vulnerabilities from being exploited.


TheOpen Source Technology Improvement Fund, Inc, thanks to funding provided bySovereign Tech Fund, engaged with Quarkslab to perform a security audit ofPHP-SRC, the interpreter of thePHP language.