H2Lab (@h2lab_org) 's Twitter Profile
H2Lab

@h2lab_org

H2Lab is a hardware harcking association targetting IoT and embedded devices security and design

ID: 1219329837107642369

linkhttps://www.h2lab.org calendar_today20-01-2020 18:45:02

153 Tweet

255 Followers

116 Following

H2Lab (@h2lab_org) 's Twitter Profile Photo

Designed for everything from power analysis and glitching to full-functional smart card/USIM reading, LEIA offers solo and #ChipWhisperer operation. Pre-Order yours on shop.h2lab.org #cybersecurity #innovation #FrenchTech #EMVco #IPTV #ITSEF #CESTI #SetTopBox

ceax (@_ceax) 's Twitter Profile Photo

[Tool] Ghidralligator: Emulate and fuzz code running on various CPU architectures (ARM, MIPS, PPC, x86, Apple Silicon M1/M2...) Based on #GHIDRA (libsla C++). #AFLplusplus, snapshot fuzzing, code coverage, ASAN cyber.airbus.com/17300/ github.com/airbus-cyber/g… GuillaumeOrlando

Iceman (@herrmann1001) 's Twitter Profile Photo

Welcome to my latest video: "Proxmark3 Tutorial: Sniffing MIFARE DESFire Cards" #proxmark #rfid #techguide youtu.be/vBkjvBFtog4

Alexandre Borges (@ale_sp_brazil) 's Twitter Profile Photo

After taking a necessary break, I returned writing new articles. To keep myself motivated, little by little I will be producing several articles in parallel: - Exploiting Reversing: article 02 - MAS 08, 09, 10 and 11. - CPP reversing series: article 01 (finally). Next week

After taking a necessary break, I returned writing new articles. To keep myself motivated, little by little I will be producing several articles in parallel:

- Exploiting Reversing: article 02
- MAS 08, 09, 10 and 11.
- CPP reversing series: article 01 (finally). 

Next week
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Bare metal firmware reverse engineering Introduction series by Ragnar Security Part 1: ragnarsecurity.medium.com/reverse-engine… Part 2: medium.com/geekculture/re… Part 3: medium.com/geekculture/re… #iot #embedded #reverseengineering #infosec #cybersecurity

Bare metal firmware reverse engineering
Introduction series by <a href="/RagnarSecurity/">Ragnar Security</a> 

Part 1: ragnarsecurity.medium.com/reverse-engine… 
Part 2: medium.com/geekculture/re… 
Part 3: medium.com/geekculture/re… 

#iot #embedded #reverseengineering #infosec #cybersecurity
Iceman (@herrmann1001) 's Twitter Profile Photo

Calling all tech enthusiasts! Interested in RFID hacking? Join the 'RFID Hacking by iceman' Discord server. A space for learning, sharing, and discussion on all things RFID hacking. Click the link to join! #RFIDHacking #TechCommunity discord.gg/QfPvGFRQxH

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Excellent collection of material for learning a bit about QEMU internals Credits Airbus Security Lab airbus-seclab.github.io/qemu_blog/ #qemu #emulation

Excellent collection of material for learning a bit about QEMU internals
Credits <a href="/AirbusSecLab/">Airbus Security Lab</a>

airbus-seclab.github.io/qemu_blog/

#qemu #emulation
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Embedded device firmware (Yaesu FT-70D radio) reverse engineering Interesting blog post by lander buff.ly/3YuutIS #embedded #reverseengineering #infosec

Embedded device firmware (Yaesu FT-70D radio) reverse engineering
Interesting blog post by <a href="/landaire/">lander</a> 

buff.ly/3YuutIS

#embedded #reverseengineering #infosec
Lionel Rivière (@mangeurdpommes) 's Twitter Profile Photo

blackhat.com/us-23/briefing… Why testing fault injection attacks on integrated circuits matters? ⚡️🚗🔐 At BlackHat 23, a research team from TU Berlin: Christian (Christian Werling), Niclas, Hans and Oleg will show voltage glitch attack against AMD Secure Processor (ASP) used in Tesla cars!

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Excellent research on reverse engineering and pwning a Google Home Mini smart speaker. A must read if you are interested in embedded device security and vulnerability research. downrightnifty.me/blog/2022/12/2… #iot #embedded #infosec #cybersecurity

Excellent research on reverse engineering and pwning a Google Home Mini smart speaker.
A must read if you are interested in embedded device security and vulnerability research.

downrightnifty.me/blog/2022/12/2…

#iot #embedded #infosec #cybersecurity
Igor Brkic (@1g0rb) 's Twitter Profile Photo

Stencilframer, a script to generate 3D printable PCB+stencil holder directly from KiCAD or gerber file, is finally updated to fully support newer KiCAD versions. hyperglitch.com/articles/stenc… I've completely rewritten the KiCAD file parser so please report any bugs/issues.

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Reverse engineering of USB flash drives with AES hardware encryption Credits Matthias Deeg blog.syss.com/posts/hacking-… blog.syss.com/posts/hacking-… #embedded #hardware #infosec #cybersecurity

Reverse engineering of USB flash drives with AES hardware encryption
Credits <a href="/matthiasdeeg/">Matthias Deeg</a> 

blog.syss.com/posts/hacking-…
blog.syss.com/posts/hacking-…

#embedded #hardware #infosec #cybersecurity
James (@baldengineer) 's Twitter Profile Photo

.@aleksorsist updates #hackadaysupercon on Thunderscope - a high-speed open-source oscilloscope that streams samples over Thunderbolt / USB Gen 3. Amazing work from an ever growing team of people and projects. github.com/EEVengers/Thun…

.@aleksorsist updates #hackadaysupercon on Thunderscope - a high-speed open-source oscilloscope that streams samples over Thunderbolt / USB Gen 3. Amazing work from an ever growing team of people and projects. github.com/EEVengers/Thun…
SSTIC (@sstic) 's Twitter Profile Photo

L'appel à contributions pour SSTIC 2024 est en ligne : sstic.org/2024/cfp/. Date limite de soumission : 5 février. Vous hésitez ? Relisez nos conseils: blog.sstic.org/2017/01/06/com…

stacksmashing (@ghidraninja) 's Twitter Profile Photo

Using a Chromecast? The latest security bulletin fixes some vulnerabilities found by Lennert, rqu and me that allowed us to compromise the bootloader, gain kernel-level code-execution and bypass the user-data protections. source.android.com/docs/security/…

Using a Chromecast?

The latest security bulletin fixes some vulnerabilities found by <a href="/LennertWo/">Lennert</a>, rqu and me that allowed us to compromise the bootloader, gain kernel-level code-execution and bypass the user-data protections.

source.android.com/docs/security/…
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Fuzzing NVMe-oF/TCP Linux kernel subsystem with Syzkaller Great blog post by Alon Zahavi (CyberArk) cyberark.com/resources/thre… #syzkaller

Fuzzing NVMe-oF/TCP Linux kernel subsystem with Syzkaller
Great blog post by Alon Zahavi (<a href="/CyberArk/">CyberArk</a>)

cyberark.com/resources/thre…

#syzkaller
H2Lab (@h2lab_org) 's Twitter Profile Photo

Today thanks to Twisted Wires and Mathieu RENARD we have launched a new production batch for our LEIA board! #smartcard #PowerAnalysis #glitching #ChipWhisperer . Pre-Order: shop.h2lab.org #EMVco #IPTV #ITSEF #SetTopBox

0xor0ne (@0xor0ne) 's Twitter Profile Photo

"From Zero to QEMU: A journey into system emulation" (slide deck) docs.google.com/presentation/d… Credits Antonio Nappa #infosec #qemu

"From Zero to QEMU: A journey into system emulation" (slide deck)

docs.google.com/presentation/d…

Credits Antonio Nappa

#infosec #qemu