Synacktiv
@synacktiv.com
570 followers 1 following 110 posts
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
Posts Media Videos Starter Packs
synacktiv.com
LLM Poisoning [1/3]: Local LLMs are vulnerable to supply chain attacks.
Inject a trigger-activated Trojan in a LLM. First step, build a probe to read a transformer's pre-down MLP activations to detect your chosen trojan trigger.

🔗 Full article www.synacktiv.com/en/publicati...
LLM Poisoning [1/3] - Reading the Transformer's Thoughts
LLM Poisoning [1/3] - Reading the Transformer's Thoughts
www.synacktiv.com
synacktiv.com
#LesAssises2025, here we go 🚀

Come and meet us at 𝘀𝘁𝗮𝗻𝗱 𝗙𝟮𝟴 to discuss your challenges and find out how we can strengthen your #cyber posture.
Adrien, Augustin and Neder will be on hand to answer all your questions and share their insights.

Seeing you there 🤝
synacktiv.com
A look back at our ninjas' first day at @hexacon.bsky.social !

We are proud of our experts Quentin and Etienne, who are leading the ‘iOS for Security Engineers’ training course.
At the same time, Matthieu and Paul are hard at work on the ‘Azure intrusion for red teamers’ training course 🚀
synacktiv.com
Join us on 24 November for the Azure Intrusion Tactics training course 🛡️

Learn offensive techniques for compromising Azure environments. Realistic scenarios, stealthy approaches and cutting-edge expertise.

Information & registration 👇
www.synacktiv.com/en/offers/tr...
synacktiv.com
Tick tock... 7 days to go until #Hexacon2025 kicks off ⏳

The @synacktiv.com team can't wait to see you at this crucial event for the #cyber ecosystem.
Our experts will be on hand to discuss the latest innovations in pentesting and reverse engineering with you !

ℹ️ www.hexacon.fr
hexacon.bsky.social
Last sponsor to announce: Synacktiv! 🥷

@synacktiv.com strives to help firms evaluate and improve their IT security, everybody there is working to make it the 🇫🇷 standard in offensive security.

There will a be a lot of ninjas lurking around, feel free to reach them out!
synacktiv.com
In our new blogpost, Alexandre Z. shows how one can abuse Unicode characters to bypass filters and abuse shell globbing, regexp, HTTP query parameters or WAFs when #MySQL strict SQL mode is off 👇
www.synacktiv.com/en/publicati...
What could go wrong when MySQL strict SQL mode is off?
What could go wrong when MySQL strict SQL mode is off?
www.synacktiv.com
synacktiv.com
The web is a prime target for attackers. Want to refine your intrusion methods?

Join our ‘Attacking Web Applications’ training course from 17 to 21 November!

▪️ 5 days of expertise
▪️ 35 hours of lessons, more than 30 exercises
▪️ Java, PHP, Python, ASP.NET...

👉 www.synacktiv.com/en/offers/tr...
synacktiv.com
🚨 Our two ninjas, Mallo and Thibaut, found two vulnerabilities on Snipe-IT that can be chained by an authenticated attacker to achieve remote command execution on the server.

Read the security advisory for more details: www.synacktiv.com/advisories/s...
Security vulnerabilities in Snipe-IT
Security vulnerabilities in Snipe-IT
www.synacktiv.com
synacktiv.com
7 days to go until #LesAssises 2025!

Join @synacktiv.com from 08 to 11 October in Monaco for France's must-attend cybersecurity event. Our ninjas can't wait to meet you!

📍 Visit our stand F28 to find out how we can help you strengthen your organisation's security posture.
synacktiv.com
All presentation materials can be found on our website: www.synacktiv.com/ressources

Some presentations also have one or multiple corresponding blogpost, which you can find here: www.synacktiv.com/publications
Ressources
Synacktiv
www.synacktiv.com
synacktiv.com
Finally, Alexandre talked about Unicode-based exploitation primitives at SEC-T. He explained the core concepts of Unicode and presented several security issues that can stem from its complexity. 🤯
The recording is available here: www.youtube.com/watch?v=3JFQ....
SEC-T 0x11: noraj - Unicode as low-level attack primitive
YouTube video by SEC-T
www.youtube.com
synacktiv.com
Afterwards, the great @quent0x1.bsky.social took the stage, also at OrangeCon, to present the authentication relay techniques he discovered earlier this year. As always, he illustrated his talk with a demo, showing these techniques can be applied to real-world AD environments. 🔥
synacktiv.com
Then, it was Riadh's turn to present his research about Chromium extensions at OrangeCon. In this talk, he explained how to circumvet the security measures in Chromium's extensions loading mechanism and showcased an exploitation toolkit he built. 🛠️
synacktiv.com
First, @remsio.bsky.social and @w0rty.bsky.social shared their research on Livewire's unmarshalling mechanism at Nullcon Berlin. They demonstrated how to achieve RCE and extended their laravel-crypto-killer tool to automate the process.
Stay tuned, something big is coming... 👀
synacktiv.com
Sharing is caring ❤️ This month, our ninjas presented their research all over the world to the offsec community!

Links and more details below 👇️
synacktiv.com
Missed our post-quantum cryptography series?
In our latest article, we explore cryptographic hybridization, with a focus on digital signatures.
Learn how to ensure a safe transition and avoid basic implementations pitfalls here👇
www.synacktiv.com/en/publicati...
Quantum readiness: Hybridizing signatures
Quantum readiness: Hybridizing signatures
www.synacktiv.com
synacktiv.com
How safe is your browser?
Our ninja, Riadh Bouchahoua, uncovers how attackers can exploit Chromium extension loading to steal data, maintain persistent access, and breach confidentiality on Chromium-based browsers.
Read more here ⬇️
www.synacktiv.com/en/publicati...
The Phantom Extension: Backdooring chrome through uncharted pathways
The Phantom Extension: Backdooring chrome through uncharted pathways
www.synacktiv.com
synacktiv.com
We present appledb_rs, an open-source tool to analyze Apple IPSWs without storing full images. Extraction, indexing, API, and web interface to speed up your security research 🔍
🔗 Full article available here: www.synacktiv.com/en/publicati...
📂 Source code: github.com/synacktiv/ap...
appledb_rs, a research support tool for Apple platforms
appledb_rs, a research support tool for Apple platforms
www.synacktiv.com
synacktiv.com
A technical look at @grapheneos.org Hardened Malloc, a memory allocator designed to mitigate heap corruption vulnerabilities (UAF, overflows) and break common exploit primitives.
Deep dive for security researchers & exploit developers by @nicoski.bsky.social
www.synacktiv.com/en/publicati...
Exploring GrapheneOS secure allocator: Hardened Malloc
Exploring GrapheneOS secure allocator: Hardened Malloc
www.synacktiv.com
Reposted by Synacktiv
ioonag.bsky.social
This summer @synacktiv.com organized an interesting challenge: the aim was to craft a container image as small as possible which replicated itself (i.e. an OCI Image Quine), bsky.app/profile/syna....
I am now publishing a write-up of what I did (Rust/asm/code golfing/...): github.com/fishilico/sy...
synacktiv.com
DCOM is everywhere, but its inner workings feel like black magic. 🪄 Unveil the mystery with @kevintell.bsky.social's new article on DCOM basics. Trust us, it's way cooler than it sounds!

www.synacktiv.com/en/publicati...
synacktiv.com
🧑‍🎓 Boost your offensive Active Directory skills with our Entry & Advanced trainings. Hands-on labs with dozens of machines + latest research from DEFCON, x33fcon & more! Seats are limited, don’t miss out!
🔗 Entry: www.synacktiv.com/en/offers/tr...
🔗 Advanced: www.synacktiv.com/en/offers/tr...
synacktiv.com
🚀 Grab your seat for Sept 29! 🚀
Join our Cloud Intrusion Tactics training for a hands-on overview of offensive security across AWS, Azure, GCP & Kubernetes. Seats are limited, don’t miss out! 👉 www.synacktiv.com/en/offers/tr...
synacktiv.com
⚡️ Ready for some Rust ⚙️ + hacking 🕵️‍♂️? Two of our ninjas will land in Florence 🇮🇹 for #rustLab2025!

📅 Nov 2–4 🔥 Workshop: Network Interception in Rust – Build a MITM Tool from Scratch

Hands-on. Real packets. Real fun. 👉 rustlab.it/talks/networ...
synacktiv.com
The GroupPolicyBackdoor tool, presented at #DEFCON 2025, is now available on Synacktiv's GitHub: github.com/synacktiv/Gr...
This python utility offers a stable, modular and stealthy exploitation framework targeting Group Policy Objects in Active Directory!
GitHub - synacktiv/GroupPolicyBackdoor: Group Policy Objects manipulation and exploitation framework
Group Policy Objects manipulation and exploitation framework - synacktiv/GroupPolicyBackdoor
github.com