Date Thu 11 December 2025
Author Damien Cauquil
Category Reverse-Engineering

This blog post demonstrates how a modern variant of an hardware attack found in the 2000's allowed the extraction of a €12 smartwatch's firmware using only cheap and robust hardware. Damien and Thomas (introduced later in this post) gave a talk on this subject at this year's leHACK edition in Paris.

Date Tue 02 December 2025
Author Lucas Laise
Category Vulnerability

Exploitation of the K7 antivirus, from the vulnerability discovery to the retro-analysis of its key components.

Date Wed 19 November 2025
Authors Robin David, Nicolas Surbayrole, Mihail Kirov
Category Blockchain

The Open Source Technology Improvement Fund, Inc. mandated Quarkslab to perform the first public security audit of Bitcoin core, the reference open-source implementation of the Bitcoin decentralized protocol.

Date Fri 07 November 2025
Authors Mihail Kirov, Sebastien Rolland
Category Software

The Open Source Technology Improvement Fund, Inc., thanks to funding provided by Sovereign Tech Fund (STF), engaged with Quarkslab to perform a security audit of KubeVirt.

Date Mon 20 October 2025
Author Quarkslab
Category Life at Quarkslab

The internship season is back at Quarkslab! Our internship positions cover a wide range of topics and expertise, and aim at tackling new challenges in various fields.

Date Tue 14 October 2025
Author Robin Bastide
Category Exploitation

This article details two bugs discovered in the NVIDIA Linux Open GPU Kernel Modules and demonstrates how they can be exploited. The bugs can be triggered by an attacker controlling a local unprivileged process. Their security implications were confirmed via a proof of concept that achieves kernel read and write primitives.

Date Thu 09 October 2025
Author Luis Casvella
Category Pentest

Bring Your Own Vulnerable Driver (BYOVD) is a well-known post-exploitation technique used by adversaries. This blog post is part of a series. In part one we saw how to abuse a vulnerable driver to gain access to Ring-0 capabilities. In this second and final part, we provide a technical explanation on how to perform reflective driver loading.

Date Tue 07 October 2025
Author Angèle Bossuat
Category Cryptography

Signal recently announced the introduction of another layer of post-quantum cryptography to their protocol, this time in their ratcheting mechanism. Let's take a look!

Date Tue 23 September 2025
Author Luis Casvella
Category Pentest

Bring Your Own Vulnerable Driver (BYOVD) is a well-known post-exploitation technique used by adversaries. This blog post is part of a series. We will see how to abuse a vulnerable driver to gain access to Ring-0 capabilities. In this first post we describe in detail the exploitation of vulnerabilities found in a signed Lenovo driver on Windows.

Date Mon 22 September 2025
Authors Mihail Kirov, Jacques Ricard, Ramtine Tofighi Shirazi
Category Software

The Open Source Technology Improvement Fund, Inc., engaged with Quarkslab to perform a security audit of the code snippets in the English version of PHP documentation, focused on some specific pages.