Laurent Clévy
lorenzo2472.bsky.social
Laurent Clévy
@lorenzo2472.bsky.social
Reverse engineering, files formats and crypto.
https://github.com/lclevy
Pinned
Curious about cryptography of archive formats zip, rar and 7zip ? github.com/lclevy/unarc...
Reposted by Laurent Clévy
🚨 ENQUÊTE | Telegram : du mythe libertaire à l’influence du Kremlin

Voyages cachés de Durov, serveurs liés au FSB et fausses promesses de sécurité : notre investigation révèle la face cachée de l'application aux 950M d'utilisateurs. ⤵️

debunkcafe.fr/telegram-myt...
Telegram : du mythe libertaire à l’influence du Kremlin - Le Débunk Café
Derrière le mythe libertaire, Telegram est-il un outil d'influence du Kremlin ? Découvrez notre enquête sur Telegram et les secrets de Pavel Durov.
debunkcafe.fr
November 24, 2025 at 4:29 PM
Reposted by Laurent Clévy
🎭 Le mythe Pavel Durov s'effondre.

Il se vendait comme un résistant au Kremlin, mais notre enquête révèle ses liens avec le FSB, un financement opaque et des failles de sécurité critiques. La façade libertaire de Telegram est une illusion.

Thread 🧵👇 (1/8)
November 24, 2025 at 4:28 PM
Reposted by Laurent Clévy
La seconde rythme aujourd'hui nos vies (communications téléphoniques, internet, GPS, etc.), mais comment a-t-on défini la mesure du temps et sur quoi repose la définition actuelle de la seconde ? 🧵👇
Cat Changing The Clock Changing The Time GIF
ALT: Cat Changing The Clock Changing The Time GIF
media.tenor.com
November 27, 2025 at 2:50 PM
Reposted by Laurent Clévy
Nouvelle vidéo du Vortex avec Jessica !
Vous voulez savoir comment fonctionne la transformation d'une chenille ? C'est ici :
www.youtube.com/watch?v=ifQY...
Un des plus grands mystères de la nature résolu I ARTE
YouTube video by Le Vortex - ARTE
www.youtube.com
November 28, 2025 at 8:49 AM
Reposted by Laurent Clévy
We’ve published new research from the EU co-funded project NGSOTI: “Learning from large-scale IPv4 blackhole: Behavioral analysis of SNMP traffic”.

Over a 12-month period (Nov 2024–Oct 2025), our network telescope captured ~634 million unsolicited SNMP queries from more than 153,000 unique IPv4 […]
Original post on infosec.exchange
infosec.exchange
November 27, 2025 at 3:10 PM
Reposted by Laurent Clévy
Présentes dans nos smartphones 🤳, ampoules LED 💡 ou batteries électriques 🔋, les terres rares sont des métaux très convoités. Le géochimiste Clément Levard (CNRS) résume 3 points clés pour comprendre pourquoi leur approvisionnement est un enjeu majeur.
Trois choses à savoir sur les terres rares
Présentes dans de multiples objets du quotidien, comme les smartphones mais aussi les ampoules LED, les batteries électriques ou les éoliennes, les terres rar
www.cnrs.fr
November 27, 2025 at 8:39 AM
Reposted by Laurent Clévy
In a Study by RTINGS, Browser Fingerprinting was investigated in detail, showing just how easy it is to uniquely identify a Visitor (even if you are using a VPN) across the 83 Laptops used in the Study #Privacy #Anonymity www.rtings.com/vpn/learn/re...
VPN vs Browser Fingerprinting: A VPN Can't Stop You From Being Tracked
Browser fingerprinting tracks you even in incognito mode. Learn why a VPN alone can't protect your privacy from this online tracking.
www.rtings.com
November 26, 2025 at 8:10 PM
Reposted by Laurent Clévy
My talk about ray-tracing is out!

youtu.be/CGR1gu2KW2s?...

Here I try to explain it in simple terms, while giving some historical context as well.
There is also a quick RTAO implementation with the worst denoise ever here:

github.com/JorenJoestar...

feedback is more than welcome!
Demystifying Vulkan Ray Tracing
YouTube video by Conferenza Italiana sul Game Development
youtu.be
November 23, 2025 at 10:57 AM
Reposted by Laurent Clévy
Intel's 386 processor (1985) was critical to the success of Intel. With 285,000 transistors, it was too much for Intel's design process and the schedule started slipping. Intel pivoted to "standard cells", an automated technique for chip layout to get back on track. Let's look closer...
November 22, 2025 at 4:56 PM
Reposted by Laurent Clévy
Intelligence artificielle : une compétition mondiale - Episode de l'émission Arte « Le dessous des cartes » diffusée le 14 novembre 2025 #IA #Video www.arte.tv/fr/videos/12...
Le dessous des cartes - Intelligence artificielle : une compétition mondiale - Regarder le documentaire complet | ARTE
Les géants américains et chinois se disputent la suprématie dans le secteur de l'intelligence artificielle, avec des investissements colossaux. L'IA générative, qui produit textes, images et…
www.arte.tv
November 22, 2025 at 8:10 PM
Reposted by Laurent Clévy
Lecture on Anti Tamper by Tim Blazytko www.youtube.com/watch?v=hQi9...
SP25: Anti Tamper
YouTube video by mr_phrazer
www.youtube.com
November 22, 2025 at 7:00 AM
Reposted by Laurent Clévy
This meme is getting out of hand, but it's actually not far from reality 🤣
November 21, 2025 at 12:13 PM
Reposted by Laurent Clévy
LevelDB-Parser is feature complete (v1.0.0)! 🎉

Analyse the database in raw view (hex) or choose between different views (IndexedDB, IndexedDB Entries, Session Storage, Local Storage and Generic Entries (UTF-8))

github.com/huebicode/le...
GitHub - huebicode/leveldb-parser: Master's thesis project, which involves developing a parser for LevelDB.
Master's thesis project, which involves developing a parser for LevelDB. - huebicode/leveldb-parser
github.com
November 20, 2025 at 12:25 PM
Reposted by Laurent Clévy
I chatted with @hex-rays.bsky.social about how I found my place in the security industry, how @blackhoodie.bsky.social came to be, what our goals are and why community matters so much. hex-rays.com/blog/blackho...
BlackHoodie Interview: Building Community, Opportunity, & Confidence
BlackHoodie founder Marion Marschalek shares her journey from early challenges to creating a global, inclusive reverse-engineering network.
hex-rays.com
November 18, 2025 at 6:02 PM
Reposted by Laurent Clévy
This cartoon gets more and more relevant with every passing day
November 18, 2025 at 1:07 PM
Reposted by Laurent Clévy
We're in Tokyo presenting our iOS emulator at the CODE BLUE Conference.

📲 You can still join our early adopter program: u.eshard.com/ios-emulation #events #cybersecurity
November 18, 2025 at 10:57 AM
Reposted by Laurent Clévy
A minimal Snake Game in 54 bytes of Assembly 🤩 - Full Code by Elisha Hollander in the QR Code below #Programming #ASM #VideoGame github.com/donno2048/sn...
November 17, 2025 at 8:05 AM
Reposted by Laurent Clévy
Real ones post their slides before their talk (or at least very shortly thereafter) ;)

Slides & materials for HWIO NL talk later this week:
“Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools & classes”

darkmentor.com/publication/...
Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools & classes | Dark Mentor LLC
We hold this truth to be self-evident&#58; SUFFERING BUILDS STRENGTH! In this talk I will walk you through the trials, tribulations, and triumph(!) of the worst debugging setup I've ever hacked together, which I used to reverse engineer the Realtek RTL8761B* family of Bluetooth chips.<p>This work was done because Bluetooth security tools are in an abominable state. We use "CSR4" (Cambridge Silicon Radio) dongles that don't support packets newer than Bluetooth 4.0 (released in 2010!), just to be able to spoof the Bluetooth Device Address (BDADDR) for MitM attacks.<p>Veronica Kovah & I have been creating Bluetooth security classes for <a href="https://ost2.fyi/">OpenSecurityTraining2</a>. And we wanted to use better hardware; ideally something that supports BT 5.4 (released in 2023). So I bought a bunch of cheap dongles off Amazon, and found that most of them used the same RTL8761B chip. So the goal was clear&#58; at a minimum, figure out a way to spoof the BDADDR on these dongles. But I also a set out a nice-to-have stretch goal - to figure out how to use these dongles to send custom LMP packets (which are architecturally not meant to be under full user control.) That way, could replace a bulky and expensive $55 dev board (that is only used for BT Classic), with a cheap and small $14 USB dongle (which has a better antenna to boot!) This would make Blue2thprinting (released at Hardwear.io 2023), and thus Bluetooth reconnaissance & vulnerability assessment, cheaper & better.<p>Bloodied (but not broken) by the ordeal, I achieved my goals and stretch goals. And given that there are no public descriptions of how Realtek Bluetooth chips work, I look forward to sharing hitherto-unknown information about how to navigate and understand these mostly-16-bit-MIPS-code systems. And I'll discuss how their ROM-"patch"ing firmware update mechanism works, how you can patch it to change its code too, and the security implications thereof.
darkmentor.com
November 17, 2025 at 6:46 AM
Reposted by Laurent Clévy
En ces temps de commémoration des 10 ans du 13 novembre 2015, j'ai enfin lu la BD « La Cellule » remarquable enquête de Soren Seelow et Kévin Jackson avec Nicolas Otero au dessin #V13 #BD arenes.fr/livre/la-cel...
La Cellule - Soren Seelow, Kévin Jackson, Nicolas Otero - Les Arènes
Abdelhamid Abaaoud, djihadiste belge membre de l’État islamique, est l’un des responsables de cette cellule. Plusieurs mois avant les attentats, il est identifié comme une menace importante par les…
arenes.fr
November 16, 2025 at 8:10 PM
Reposted by Laurent Clévy
I’ll be teaching my next deobfuscation class at @re-verse.io (Orlando), Mar 2–5, 2026. Learn to dissect modern protections, devirtualize VMs, and simplify MBA expressions using symbolic execution, SMT solving, and synthesis.

Details: shop.binary.ninja/products/re-...
November 16, 2025 at 8:20 PM
Reposted by Laurent Clévy
Dozens of M.C. Escher Prints have been digitized and put Online by the Boston Public Library #Maths #Paintings #Arts www.openculture.com/2025/11/doze...
Dozens of M.C. Escher Prints Have Been Digitized & Put Online by the Boston Public Library
In addition to the iconic scene in Jim Henson’s Labyrinth, or appearances in animated TV shows and video games, M.C.
www.openculture.com
November 15, 2025 at 8:10 PM
Reposted by Laurent Clévy
less known way to calculate sha256 of files on Windows

disksnapshot -c -k -v c:\test

will print out file info including sha256 for every file in the directory
November 14, 2025 at 7:35 PM
Reposted by Laurent Clévy
Periodic call for volunteers: We're looking for classes on Apple ecosystem security. E.g. OS internals, binary formats, malware analysis, vulnerability hunting, etc. If you're interested in sharing what you know, reach out at teach🌀ost2.fyi
November 14, 2025 at 1:37 PM
Reposted by Laurent Clévy
Squeeeee 🥳 I'll be teaching my Advanced Linux Malware Reverse Engineering class at RE//verse conference in 2026!! MORE Linux APT insides and peculiarities😍🥰🤩Pls share if you can🙃
shop.binary.ninja/products/re-...
RE//verse 2026 Training - Advanced Linux Malware Reverse Engineering with Marion Marschalek
This fast-paced 3-day training explores Linux internals and Linux binary analysis techniques, before jumping right in with common Linux malware. Work through advanced samples, Linux software protectio...
shop.binary.ninja
November 12, 2025 at 6:59 PM