@cryptax.bsky.social
230 followers 170 following 110 posts
Android malware analysis. Ph0wn CTF founder. IoT hacking. Frequent speaker at Virus Bulletin, Insomnihack etc. Based in France. Currently testing Bluesky. Otherwise on Mastodon.social.
Posts Media Videos Starter Packs
cryptax.bsky.social
Setting up your laptop before the workshop:

- It helps if you have already installed Radare2: radare.org/n/radare2.html .

- If you want to isolate your own OS from the workshop, I recommend Exegol, or Docker, or a Kali VM.

#radare2 #exegol #docker #kali #brucon
cryptax.bsky.social
On Thursday afternoon, I am thrilled to give my first r2ai & ghidraMCP workshop at BruCON.

Pre-requisites: you are good to go if you already have reversed a binary (with whatever #disassembler, it doesn't matter) OR if you have basic skills and understanding in #assembly.

#mcp #LLM #AI
cryptax.bsky.social
One of the demos is here: asciinema.org/a/pBPEaJhp6c...

It demonstrates the automatic mode of r2ai, where we can ask a question whose answer requires to read/understand several functions of the binary.

#radare2 #r2ai #AI #LLM
Linux/Trigona analysis of /fast option
Recorded by cryptax
asciinema.org
cryptax.bsky.social
Slides of my prez at Barb'hack: www.fortiguard.com/events/6189/...

Understand what a recent sample of Linux/Trigona #ransomware does.

Learn how to spot #AI errors (hallucinations, omissions etc), learn how to tweak context length, output token limits to get the best out of your model.

#barbhack25
Publications | FortiGuard Labs
<p>This talk presents 2 different Linux malware:</p><ul><li><p>a shellcode, named Linux/Shellcode_ConnectBack.H!tr. The binary is small and compact, but traditional disassemblers like Ghidra fail to p...
www.fortiguard.com
cryptax.bsky.social
Nevertheless, I've done more reverse engineering on Android malware than for Linux malware. I'm not "a strong expert", and r2ai lowered the bar + it quickens the analysis.

I think that's the goal of r2ai: give malware analysts a nice tip when they need one + speed up their work.

n=3
cryptax.bsky.social
Nobody would expect me to play the violin in a concert hall tomorrow, even with the help of AI.
And, to be honest, that wouldn't even be good, it would devalue the profession.
The same applies to anti-virus research.

2/n
cryptax.bsky.social
I had (several) interesting questions yesterday on r2ai.
One of them was that, obviously the tool needed to be used by an experienced reverse engineer.
I'd like to comment a bit further.
I feel normal that such a tool cannot be used by total beginners. All jobs require some adequate training. 1/n
cryptax.bsky.social
Barb'hack is over and it was a pleasure to attend: very nice folks, friendly organizers, excellent food, best rumps lol and a CTF with a videogame interface+ challenges on Minitel. I loved it! Kudos to the staff.
#barbhack25
cryptax.bsky.social
I've very happy to speak at Barb'hack on Saturday.
barbhack.fr/2025/fr/conf...

There will be 2 demos.
One live.
One recorded - simply because I don't have the guts to do it live ;P

We reverse engineer Linux/Trigona and Linux/Shellcode with radare2 + AI + HI

HI standards for Human Intelligence ;P
this image was generated by Dall-E based on a prompt that describes what Linux/Trigona malware does. The malware is implemented in Delphi, thus the FPC (Free Pascal Compiler).
cryptax.bsky.social
Hey, @lastpass.bsky.social I wish you'd fix that. True, it involves a malicious website, but it's really difficult to spot from the end-user's perspective.
How about asking for a confirmation password before sharing the password database perhaps?
cryptax.bsky.social
Overlays are often used in Android malware.
They are actually a burden to other domains such as browser extensions. This research, by Marek Toth, shows how click jacking [on hidden overlays] can trick the end-user in sharing his/her entire password manager.

marektoth.com/blog/dom-bas...
DOM-based Extension Clickjacking: Your Password Manager Data at Risk
I described a new attack technique that I used against 11 password managers. The result was that stored data of tens of millions of users could be at risk.
marektoth.com
Reposted
virusbtn.bsky.social
Last chance to share your research at VB2025.

Whether you have fresh research, practical insights, or real-world case studies to share, now is your moment to step into the spotlight!

📅 24 Aug 2025 — only 5 days left
📍 Berlin. 24–26 Sept 2025

👉 tinyurl.com/3mccm8br
Aug 24
Last-minute CFP still open - only 5 days left
VB2025 Berlin 24-26 Sept 2025
cryptax.bsky.social
I've recently setup a LM Studio server, with several models including gpt-oss. I can use it from my disassembler, here to analyze a Linux/Trigona sample.

Learn more about Trigona at Barb'hack on Aug 30 in Toulon.

#AI #malware #reverse #assembly #context #lmstudio #GPT
cryptax.bsky.social
Normally, I don't do Windows malware ;P
This blog post sparked special interest research.checkpoint.com/2025/ai-evas...

Although after this interesting read, I still wondered how the prompt was launched, exactly what for, and also what the malware did globally. So, did my own research.
New Malware Embeds Prompt Injection to Evade AI Detection - Check Point Research
Detected for the first time, malware attempts AI evasion by injecting a prompt to tell the LLM to label the file as benign
research.checkpoint.com
cryptax.bsky.social
W32/SkyAI uses AI? So do I.

cryptax.medium.com/w32-skyai-us...

- Where the malware loads the AI prompt, what for, why it fails.
- How to find the encryption key with AI
- Extract & decrypt the embedded PE
- How the malware checks if it's on a VM
- R2ai tips when curl argument is too long
W32/SkyAI uses AI? So do I.
A new sample, named W32/SkyAI (or Topozuy, or Skynet), has recently emerged, showing use of a AI prompt bypass attempt. Perfect occasion to…
cryptax.medium.com
Reposted
bearstech.com
Le nouveau zine de @b0rk.jvns.ca : Les règles secrètes du terminal

👉 jvns.ca/blog/2025/06...
table des matières
cryptax.bsky.social
Mon code github.com/cryptax/pico...

Je contrôle les yeux et les sourcils de Pico + il peut parler avec une bulle de BD.
Rien de plus. Le contrôle via une manette n'est pas implémenté. Chez @tixlegeek.bsky.social, c'est bien plus avancé (synchro bouche par ex), j'en suis loin.
GitHub - cryptax/pico-controller: A web server that animates Pico le Croco
A web server that animates Pico le Croco. Contribute to cryptax/pico-controller development by creating an account on GitHub.
github.com
cryptax.bsky.social
L'épisode 193 www.youtube.com/watch?v=B7oR... vers 1h40 (mais tout est intéressant dans cet épisode, une pépite !)

J'ai repris l'idée d'utiliser un serveur web et de mettre ça en source dans OBS. Après l'implémentation même du serveur est sans doute différente, chez moi en Python (Flask)
EP 193 | IOT & RADIO-HACKING Ft. @tixlegeek @FlUxIuS @virtualabsTechno-Watch
YouTube video by Laluka
www.youtube.com
cryptax.bsky.social
Vous connaissez les vidéos de @tixlegeek.bsky.social ? Avec cet adorable Tux animé ? Ben, ça me faisait trop envie. Alors j'ai fait pareil avec Pico le Croco ! J'ai repris les explications de
@tixlegeek.bsky.social dans le Twitch @laluka.bsky.social EP 193, et j'ai codé pour Pico :)