reverseth
banner
reverseth.bsky.social
reverseth
@reverseth.bsky.social
French pentester, but currently traveling around the world.
Passionate about hacking, I also enjoy building things with Rust.
Reposted by reverseth
Evolution of Rust compiler errors

kobzol.github.io/rust/rustc/2...

#rustlang
May 17, 2025 at 2:39 PM
Reposted by reverseth
Confirmed! Thomas Bouzerar and Etienne Helluy-Lafont from Synacktiv used a heap-based buffer overflow to exploit #VMware Workstation. They earn $80,000 and 8 Master of Pwn points - sending the contest to over $1,000,000 total! #Pwn2Own
May 17, 2025 at 3:14 PM
Reposted by reverseth
Sweet! Corentin BAYET (@OnlyTheDuck) from @Reverse_Tactics barely needed a second to demonstrate his exploit against VMware ESXi. He heads off to the disclosure room to provide the details of his work. #Pwn2Own #P2OBerlin
May 17, 2025 at 12:31 PM
Reposted by reverseth
Several vulnerabilities identified in the venerable "screen" utility, including a root LPE 😈

Thanks @dustri.org for the notification…

security.opensuse.org/2025/05/12/s...
Multiple Security Issues in Screen
Screen is the traditional terminal multiplexer software used on Linux and Unix systems. We found a local root exploit in Screen 5.0.0 affecting Arch Linux and NetBSD, as well as a couple of other issues that partly also affect older Screen versions, which are still found in the majority of distributions.
security.opensuse.org
May 12, 2025 at 4:00 PM
Reposted by reverseth
L'intégrale de "La dernière" du 11 mai avec Richard Monvoisin est disponible en podcast !

(Ré)écouter l'émission : podcasts.nova.fr/radio-nova-l...
May 12, 2025 at 8:50 AM
Reposted by reverseth
Adding NOPs can make your program 30% faster!

Sounds counterintuitive, but it’s all about aligning the μop-cache.

The same code executed as a "lucky" layout prevents front-end stalls.

Avoiding double-hits to the cache (or worse-yet, complete misses) produces huge gains.
April 30, 2025 at 8:33 PM
Reposted by reverseth
5 ans déjà.
Le plus gros scandale sanitaire de l'histoire.
Pertes de chance et décès évitables.
Harcèlement et menaces.
Découverte de dérives similaires depuis 30 ans.
Et ???? Et Rien... Et c'est la le pire scandale !
March 1, 2025 at 9:19 AM
Reposted by reverseth
En raison des dérives de X, dont l'algo semble rendre complètement inopérant le partage d'informations scientifiques & la confrontation sereine des idées, le Conseil Scientifique du @cnrs.bsky.social invite les instituts & laboratoires affiliés à évaluer la pertinence de leur présence sur X.

1/2
February 8, 2025 at 9:14 AM
C'est le monde à l'envers.

J'ai l'impression d'ouvrir un calendrier de l'après, tous les jours on a une nouvelle dinguerie venant de ce taré.
🇺🇸 ⚖️ Donald Trump a signé un décret prévoyant des sanctions contre la Cour pénale internationale, qu'il a accusée d'avoir "engagé des actions illégales et sans fondement contre l'Amérique" et Israël.
➡️ https://u.afp.com/S4dx
February 7, 2025 at 11:37 AM
Reposted by reverseth
January 21, 2025 at 11:35 PM
Reposted by reverseth
rs-shell - A TLS over TCP reverse shell for Windows and Linux. Has some nice evasion features for Windows:

github.com/BlWasp/rs-sh...
GitHub - BlWasp/rs-shell: A dirty PoC for a reverse shell with cool features in Rust
A dirty PoC for a reverse shell with cool features in Rust - GitHub - BlWasp/rs-shell: A dirty PoC for a reverse shell with cool features in Rust
github.com
January 5, 2024 at 2:22 PM
Reposted by reverseth
This year again, I am lucky enough to get nominated twice for the Top Ten Hacking Techniques, for my research on iconv and PHP, and lightyear. This time feels a bit special however, as these are my last blog posts on ambionics.
www.ambionics.io/blog/iconv-c...
www.ambionics.io/blog/lightye...
January 16, 2025 at 7:42 AM
Reposted by reverseth
We broke something:

in a recent pentest on a hardened target, we were able to achieve unauthenticated Remote Code Execution (RCE) via Server-Side Template Injection (SSTI) in a Spring Boot application

We wrote it down for you to try at home:

modzero.com/en/blog/spri...
Exploiting SSTI in a Modern Spring Boot Application (3.3.4)
modzero.com
January 10, 2025 at 9:51 AM
Joyeuses fêtes à tous.
December 26, 2024 at 1:38 AM
Reposted by reverseth
SpeeDons revient pour une cinquième édition !

4 jours non stop de stream caritatif pour financer les actions de Médecins du Monde.

📍 Centre des Congrès de Lyon, Grand Amphithéâtre
📅 27/02 - 02/03

#SpeeDons
November 20, 2024 at 1:26 PM
Est-il justifié d'être grognon juste par cette image ?
December 6, 2024 at 3:56 AM
Reposted by reverseth
it's zine sale time!

from now until the end of the day on Friday, all my PDF zines are 50% off with the discount code WIZARDPDF

print zines are 30% off with code WIZARDPRINT

wizardzines.com
November 29, 2024 at 1:51 AM
Reposted by reverseth
Bonjour,
Bienvenue dans ce live-skeet du procès de Florent Curtet, ce trentenaire poursuivi pour des extorsions numériques, jugé en cette fin de mois à Paris par le tribunal judiciaire.
November 25, 2024 at 12:40 PM
Reposted by reverseth
In case you missed it, @albinowax.bsky.social 's amazing talk "Listen to the Whispers: Web Timing Attacks that Actually Work" from Def Con is now available to watch on YouTube.

www.youtube.com/watch?v=zOPj...
DEF CON 32 - Listen to the Whispers: Web Timing Attacks that Actually Work - James Kettle
YouTube video by DEFCONConference
www.youtube.com
November 25, 2024 at 8:46 AM
Reposted by reverseth
Welcome to my mega 🧵 on getting started with Rust on the RP2040! This thread aims to get you started with writing Rust on the Raspberry Pi Pico. The actual end result will just be a blinking on-board LED. It’s up to YOU to take this foundation and make awesome projects from it.
November 24, 2024 at 11:59 PM
Reposted by reverseth
I’ve to say that I’m impressed by how @xbow.com managed to identify this SSRF vulnerability (and bypass a MIME filter on its way) 🤖
XBOW – SSRF & URI validation bypass in 2FAuth
XBOW discovered a Server-Side Request Forgery (SSRF) vulnerability in the OTP preview feature of the open-source project, 2FAuth.
xbow.com
November 24, 2024 at 2:38 PM
Reposted by reverseth
In case you're a professional Burp Suite user, there's a few seats left for the Q1 2025 training sessions

hackademy.agarri.fr/2025
I'm using burp for like 15 years now, but @agarri.fr's training was absolutely mind blowing and really super charged my burp skills!
November 17, 2024 at 4:55 PM
Reposted by reverseth
We're doing a cool online talk tomorrow btw – hexarcana.ch/workshops/cv...
CVEs of SSH
A talk about recent high-profile issues related to the SSH ecosystem.
hexarcana.ch
November 20, 2024 at 7:19 PM
Reposted by reverseth
Great article about multipart parsing. Reminds me about the bypasses I found in modsec parser medium.com/@terjanq/waf...
November 19, 2024 at 1:13 PM