Date Wed 05 August 2015
Author Guillaume
Category Cryptography

Linux 4.1 has arrived with a new feature for its popular ext4 filesystem: filesystem-level encryption!

Date Wed 08 July 2015
Author Gabriel
Category Exploitation

Nowadays, two-factor authentication is unavoidable. This blogpost details a vulnerability found in the implementation of a YubiKey OTP verification server.

Date Thu 25 June 2015
Authors Sébastien Kaczmarek, Cyril Cattiaux
Category Pentest

In 2014, QuarksLab was missioned by OpenITP [1] to audit the iOS application ChatSecure and to identify any weakness that could lead to information leakage or any other risk that could impact the user.

Date Wed 10 June 2015
Author Jonathan Salwan
Category Program Analysis

Triton is a Pin-based concolic execution framework which provides some advanced classes to perform DBA.

Date Mon 01 June 2015
Author Adrien Merlini
Category Programming

Where a simple xor gets transformed beyond what it ever thought

Date Fri 15 May 2015
Author Alexandre Quint
Category Challenge

One month ago, we launched a development challenge. Here come the results.

Date Fri 17 April 2015
Author Guillaume Dedrie
Category Challenge

Contribute to IRMA and enter for your chance to win a free ticket to Amsterdam to attend the HITB security conference.

Date Mon 23 March 2015
Author Le Maréchal
Category Software

A modest comparison between two ways of storing our unstructured data, from MongoDB to Elasticsearch.

Date Mon 23 February 2015
Author kamino
Category Software

IRMA (Incident Response & Malware Analysis) is a multi-scanner framework for identifying and analyzing suspicious files. In this article, we describe, step by step, how one can contribute to this open-source project by integrating his own analyzer.

Date Mon 02 February 2015
Author Adrien Merlini
Category Programming

A "hands-on" introduction to LLVM passes through obfuscation.