AI-Driven Threat Modeling – LLMs for Automated STRIDE Analysis
| | | |

AI-Driven Threat Modeling – LLMs for Automated STRIDE Analysis

AI-Driven Threat Modeling LLMs for Automated STRIDE Analysis Threat modeling has always been about understanding how the components of an application interact, where the boundaries lie, and what could go wrong at each connection. Traditionally, this process has been manual, relying on diagrams and the expertise of security professionals to map out relationships and identify…

EVM Security – Insights from Zer0Con 2025
| | | |

EVM Security – Insights from Zer0Con 2025

EVM Security Insights from Zer0Con 2025 At Zer0Con 2025, the FuzzingLabs team, Mathieu Hoste and Bryton Bernard, delivered an engaging and insightful presentation on one of the most critical aspects of Ethereum’s security: the vulnerabilities within the Ethereum Virtual Machine (EVM). In our session, titled “Ethereum’s Achilles’ Heel: Attacking and Fuzzing EVMs for Fun (and…

Linux Hardening – State of Linux Snapshot Fuzzing
| |

Linux Hardening – State of Linux Snapshot Fuzzing

Linux Hardening State of Linux Snapshot Fuzzing What is snapshot fuzzing ? Fuzzing is a well-established technique for finding software vulnerabilities, and snapshot fuzzing represents a significant advancement, enhancing efficiency and expanding the scope of testable software. Snapshot fuzzing is particularly valuable in application security where it enables thorough black-box testing of applications, regardless of…

Differential Cryptanalysis 101​ – Exploring Differential Methods in Block Ciphers​
| |

Differential Cryptanalysis 101​ – Exploring Differential Methods in Block Ciphers​

Differential Cryptanalysis 101 Exploring Differential Methods in Block Ciphers Cryptanalysis has been playing an essential role in the security of both software and hardware systems for decades and now more than ever. Many knows the essentials of cryptography through school, trainings or self learning, but very few know the ways of cryptanalysis, which is equally…

Attacking & Fuzzing Polkadot Node – Triggering Denial-of-Service via Gossamer RPC Flaws​
| | | | |

Attacking & Fuzzing Polkadot Node – Triggering Denial-of-Service via Gossamer RPC Flaws​

Attacking & Fuzzing of Polkadot Node Triggering Denial-of-Service via Gossamer RPC Flaws Gossamer is a Go-based implementation of a Polkadot node, developed by ChainSafe Systems. It allows interaction with the Polkadot network, enabling users to participate as full nodes, validators, or other roles. In this post, we will show you what we did to find…

HTB University Writeup – Hacking StarGazer in HTB CTF
|

HTB University Writeup – Hacking StarGazer in HTB CTF

HTB UNIVERSITY Writeup Solidity Shenanigans: Hacking StarGazer in HTB CTF In mid-December, our school team, Phreaks 2600, participated in the HTB University CTF. Among the challenges featured in the competition was one titled “StarGazer,” classified as the Hard challenge of the Blockchain category. This challenge focused on Solidity and explored the concepts of UUPSUpgradeable and…

Introduction to modern memory management
|

Introduction to modern memory management

Memory management Introduction to modern memory management The goal of this article is to present the functioning of volatile memory in general on our modern computers. Physical Organization Before discussing volatile memory, it is important to understand the basics of how a computer operates. A PC is composed of several electronic components and peripherals that…

Ph0wn2024 Writeup – Race Roller​ Application reversing
| |

Ph0wn2024 Writeup – Race Roller​ Application reversing

Ph0wn2024 Writeup Race Roller Application reversing The Ph0wn 2024 CTF was a hacking challenge specialized in smart-devices and low-level softwares.This event took place on November 30th in the south of France. It is a very original CTF because we had very original challenges such as hacking EV3 Lego robots or Pico PCB. In this article…

Attacking Reasoning models​
|

Attacking Reasoning models​

DeepSeek R1 & Claude LLM vulnerabilities Attacking Reasoning models In recent months, reasoning models have gained significant attention, particularly with the emergence of DeepSeek R1, which aim to improve logical consistency and step-by-step problem-solving in LLMs. At the core of these advancements is Chain of Thought (CoT) reasoning, a technique that enables models to break…

BGP Under Pressure : Protocol Fuzzing in action
| |

BGP Under Pressure : Protocol Fuzzing in action

BGP Under Pressure Protocol Fuzzing in action When it comes to keeping the internet running smoothly, the Border Gateway Protocol (BGP) is absolutely essential. BGP is the backbone of how routers share the best paths for data across different networks. Given its importance, even small bugs can cause big headaches. That’s why we’ve been busy…