Date Thu 07 May 2026
Authors Madimodi Diawara, Lucas Di Martino
Category File Formats

This article presents the structure of the Independent Guest Virtual Machine (IGVM) file format, a binary file designed to define and securely launch the initial state of a virtual machine. It bundles all necessary components such as the BIOS/OVMF, kernel, and initial ramdisk, into a single file. We'll focus on a concrete example to understand the main structure of the file format.

Date Tue 05 May 2026
Authors Dahmun Goudarzi, Julio Loayza Meneses
Category Cryptography

The OSTIF collaborated with Quarkslab to conduct a security audit of Paramiko, a pure-Python implementation of SSHv2 that provides both client- and server-side functionality. Given the sensitivity and importance of the target, the review focused not only on Paramiko itself but also on its dependencies. The assessment covered its interaction with rust-openssl bindings, the use of secure entropy sources, adherence to constant-time requirements, as well as code quality, testing practices, and the CI/CD pipeline, with the goal of identifying opportunities for further hardening.

Date Thu 30 April 2026
Author Sébastien Rolland
Category Cloud

This blog post explores Entra ID applications, the complexities of auditing application permissions in Microsoft Entra ID, highlighting hidden risks and pitfalls. It introduces Quarkslab's QAZPT tool, designed to compute and visualize effective permissions in an Entra ID tenant, providing insights into the full picture of permissions and inheritance paths.

Date Thu 16 April 2026
Author Robert Yates
Category Program Analysis

How one Commit Broke Obfuscation: A blog post exploring the role of compilers and optimizations in the field of obfuscation and de-obfuscation.

Date Tue 14 April 2026
Author Sami Babigeon
Category Program Analysis

Since its initial released in December 2023, many people have used and built tools around the BSIM feature of Ghidra but up to this date its internals were unknown. This post brings some light on how BSIM works, theoretically and in it's C++ implementation.

Date Thu 09 April 2026
Author Romain Marchand
Category Automotive

From hardware analysis to OSINT: how we retrieved information about a BYD car crash by analyzing the TCU embedded memory.

Date Tue 07 April 2026
Author Lucas Laise
Category Vulnerability

Exploitation of an arbitrary directory deletion via symlink following in the antivirus Intego.

Date Thu 02 April 2026
Authors Sami Babigeon, Benoît Forgette
Category Program Analysis

In this blog post we present SightHouse, an open-source tool designed to assist reverse engineers by retrieving information and metadata from programs and identifying similar functions already known from other libraries, binaries or any other source codes that can be found online.

Date Tue 31 March 2026
Authors Laurent Laubin, Sami Babigeon, Christian Heitman
Category Reverse-Engineering

In this blog, we present how QBDI and TritonDSE can be used to attack a complex C++ binary implementing a VM.

Date Thu 26 March 2026
Author Keissy BOD
Category Pentest

Deep dive into Web Application Firewall (WAF) bypasses, from misconfiguration exploitation to crafting obfuscated payloads. We show the impact of the parsing discrepancy between how a WAF reads a request and how a backend executes it. It is not a bug, it is a feature.