Recrutement
Si vous êtes intéressés pour bosser sur des sujets sympas tout en restant loin de Paris, consultez nos offres d'emploi et envoyez nous votre CV à rh@amossys.fr.

Archives

Retour d'expérience de tests d'intrusion internes

Desktop Elements Detection Using Deep Learning

Sujets de stage 2020-2021

Ransomwares : quel mode opératoire en 2020 ?

Spectre V1 in userland

Sodinokibi / REvil Malware Analysis

Linux RNG architecture

Windows filter communication ports

Exploring Hex-Rays microcode

Sujets de stage 2019-2020

Fragscapy: Fuzzing protocols to evade firewalls and IDS

Machine Learning in Nmap

Smart Light Bulb Teardown

Sujets de stage 2018-2019

MemITM, a memory fuzzer/sniffer

Portable Executable format, compilation timestamps and /Brepro flag

Threat Hunting (Recherche de compromissions)

BreizhCTF 2k18 Write-Ups

BADFLICK is not so bad!

The Windows 10 TH2 INT 2E mystery

DIMCT

Teampass < 2.1.27.9 multiple vulnerabilities

BreizhCTF 2k17 Write-Ups

Virtualization Based Security - Part 2: kernel communications

Virtualization Based Security - Part 1: The boot process

An introduction of Use-After-Free detection in binary code by static analysis

A recap of 32C3

Tutorial: How to reverse unknown protocols using Netzob

A peek inside antivirus’ cloud features

Automated Reverse Engineering of Cryptographic Algorithms

Design and usage of OpenDTeX DRTM Secure Boot

A tale of 31C3 - Part 2

A tale of 31C3 - Part 1