Movatterモバイル変換


[0]ホーム

URL:


  • Français
  • English

Your outsourced R&D partner

At Quarkslab, we leverage over 12 years of research and development (R&D) experience to deliver comprehensive protection against potential risks. In addition to offering top-tier security consulting and services, we ensure that your cybersecurity defenses are not only robust but also evolve continuously to meet the ever-changing threat landscape and the latest industry best practices.

R&D missions

At Quarkslab, our mission is clear: to lead the way in research and development (R&D) by setting new industry standards for innovation, expertise, and knowledge-sharing. We are committed to leveraging cutting-edge R&D to secure the future and deliver a competitive edge to our clients and partners.

Our reputation is built on the exceptional technical skills and forward-thinking practices we proudly provide. We aim to be recognized globally for the quality and depth of our expertise, helping our clients tackle complex challenges with confidence.

Collaboration and knowledge-sharing are at the heart of what we do. By fostering open communication and innovation, we empower both individuals and organizations to grow and thrive. Whether within our team or with our clients and communities, we believe progress comes from working together to shape a better, more secure future.

Join us as we push the boundaries of technology and create solutions that inspire.

R&D stats

0

talks presented 

0

blog posts published

0

vulnerabilities identified 

0

academic articles published

Our latest CVEs

Explore the latest CVEs issued by our team.

CVE-2025-1223

A Local Privilege Escalation
vulnerability in Citrix Secure
Agent for MacOS

18-02-2025

CVE-2024-21925

AMD UEFI firmware: Improper
input validation within the
AmdPspP2CmboxV2 driver

11-02-2025

CVE-2024-0179

AMD UEFI firmware: SMM callout vulnerability within theAmdCpmDisplayFeatureSMM driver

11-02-2025

CVE-2025-21194

Microsoft Surface SecurityFeature Bypass Vulnerability
11-02-2025

CVE-2024-56138

Notation-go: Timestamp signature generation vulnerability.
16-12-2024

CVE-2024-54137

Correctness error in the reference implementation of the HQC key encapsulation mechanism in liboqs
04-12-2024

CVE-2024-53947

SQL injection vulnerabilities inApache Superset
03-12-2024

CVE-2024-51491

Process crash during CRL-basedrevocation check on OS usingseparate mount point for tempDirectory in notation-go
28-10-2024

CVE-2024-47026

out of bounds read due to anincorrect bounds check ingsc_gsa_rescue of gsc_gsa.c
25-10-2024

CVE-2024-20659

Windows Hyper-V SecurityFeature Bypass Vulnerability
08-10-2024

CVE-2024-9026

PHP-FPM logs from children may be altered
02-09-2024

CVE-2024-8929

Leak partial content of the heapthrough heap buffer over-read in mysqlnd
17-09-2024

Public reports and blog posts

Read our latest insights and findings in our Blog

Security audit of
PHP-SRC

The Open Source Technology Improvement Fund, Inc, thanks to funding provided by Sovereign Tech Fund, engaged with Quarkslab to perform a security audit of PHP-SRC, the interpreter of the PHP language.

A small bug in the signature verification of AOSP OTA packages

A signature verification bypass in a function that verifies the integrity of ZIP archives in the AOSP framework.

CCleaner Local Privilege E
scalation Vulnerability on macOS

A technical exploration of a trivial Local Privilege Escalation
Vulnerability in CCleaner <= v1.18.30 on macOS.

Beyond the Hook:
A Technical Deep Dive into Modern Phishing Methodologies

A technical exploration of modern phishing tactics, from basic HTMLpages to advanced MFA-bypassing techniques, with analysis of infrastructure setup and delivery methods used by phishers in 2025.

Open-source tools

Discover the open-source tools developed and maintained by our team of security engineers

CryptoCondor

crypto-condor is a Python library for compliance testing of implementations ofcryptographic primitives.

QBDI

QBDI by Quarkslab is a modular, cross-platform dynamic binary instrumentation framework for analyzing and manipulating binary code at runtime.

Diffing Portal

Diffing Portal aims to centralize and provide various resources on binary diffing, a usefultechnique for reverse-engineering, in one place.

Check out a more exhaustive list of our open-source tools

Where to find us

Come and meet us on the road!

Wine Rump 2025

26th September, Bordeaux, France

Bypassing ASLR on MIPS32 Using Simple Mathematics by
Mickael Mestouri

Volcamp 2025

2nd October, Clermont-Ferrand, France

T’as vu mes docs ? Je les fais avec typst ! by
Virginie Pageaud

UYBHYS

7th November, Brest, France

Apkpatcher: Reverse Engineering and Modifying Android Applications Without Rooting by Benoît Forgette

Talk to our experts

Get in touch with our team for a demo

Company

Société

Ressources

Ressources

Contact Us

Contactez Nous

  • +33 (0)1 58 30 81 51
  • Email us
  • Paris : 10 bd Haussmann, 75009 PARIS
  • Rennes : 12 av. Henri Fréville, 35000 RENNES
  • Buenos Aires : Av. Raúl Scalabrini Ortiz 2444, C1425DBS BUENOS AIRES
  • +33 (0)1 58 30 81 51
  • Nous écrire
  • Paris : 10 bd Haussmann, 75009 PARIS
  • Rennes : 12 av. Henri Fréville, 35000 RENNES
  • Buenos Aires : Av. Raúl Scalabrini Ortiz 2444, C1425DBS BUENOS AIRES

[8]ページ先頭

©2009-2025 Movatter.jp