Chai
ant4g0nist.bsky.social
Chai
@ant4g0nist.bsky.social
Founder @ Yokai || Vulnerability Research || fuzzing artist || cypherpunk || 🦀

https://yokai.network
ManuFuzzer, an LLVM-based binary code coverage-guided fuzzing framework for macOS, update! 🎉

- Improved shadow memory management
- Better instrumentation handling

🧪 NEW: Experimental dyld cache intelligence that auto-instruments frameworks sharing memory pages!

github.com/ant4g0nist/Manufuzzer
https://github.com/ant4g0nist/Man…
May 14, 2025 at 12:04 PM
Just shipped AI-assisted debugging support for LLDB! 🚀 Added MCP to LLDB making agentic debugging possible. Works well with #claude/cline, and it can set breakpoints, inspect memory, and control execution.

✨: Why should IDA have all the fun?

github.com/ant4g0nist/lisa.py
March 29, 2025 at 8:48 AM
Reposted by Chai
Really enjoyed speaking at the inaugural edition of @re-verse.io!

You can find Tomasz' and my slides on tricks with SIMs and interposers here: tinyurl.com/reverse25-si...
March 5, 2025 at 5:41 PM
Reposted by Chai
Full details of EntrySign, the AMD Zen microcode signature validation vulnerability disclosed last month. bughunters.google.com/blog/5424842...
Blog: Zen and the Art of Microcode Hacking
This blog post covers the full details of EntrySign, the AMD Zen microcode signature validation vulnerability recently discovered by the Google Security team.
bughunters.google.com
March 5, 2025 at 11:46 PM
Reposted by Chai
Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY (Amin Abdulrahman, Matthias J. Kannwischer, Thing-Han Lim) ia.cr/2025/366
March 4, 2025 at 7:45 AM
Reposted by Chai
This is a fascinating vulnerability.

The root causes are implementing deterministic signatures instead of hedged, using a general purpose big number implementation, and leaking its API at the crypto layer.

JavaScript types are a red herring, could have happened in any language.
Private key extraction in ECDSA upon signing a malformed input (e.g. a string)
### Summary Private key can be extracted from ECDSA signature upon signing a malformed input (e.g. a string or a number), which could e.g. come from JSON network input Note that `elliptic` by...
github.com
February 16, 2025 at 10:08 AM
Can’t wait to be back in Florida
February 15, 2025 at 4:33 PM
Reposted by Chai
A new advisory that affects deterministic ECDSA signing in elliptic, which was used in MetaMask. github.com/indutny/elli...
Private key extraction in ECDSA upon signing a malformed input (e.g. a string)
### Summary Private key can be extracted from ECDSA signature upon signing a malformed input (e.g. a string or a number), which could e.g. come from JSON network input Note that `elliptic` by...
github.com
February 15, 2025 at 1:41 PM
Reposted by Chai
Our friends at ELTE are organizing the Central European Crypology conference (CECC 2025) in Budapest and they're looking forward to your submissions (you only need to submit an extended abstract). Every info on the webpage: cecc2025.inf.elte.hu/en/
Central European Conference on Cryptology 2025
Central European Conference on Cryptology 2025
cecc2025.inf.elte.hu
February 13, 2025 at 4:19 PM
Such beauty😻
January 13, 2025 at 7:52 PM
Reposted by Chai
I will give two lightning talks at #38c3 🎉 Both on day 3, stage Huff, around 11:30am.

Detecting Fake Base Stations with CellGuard on iOS 📶
cfp.cccv.de/38c3-lightni...

iOS Inactivity Reboot 📲
cfp.cccv.de/38c3-lightni...
iOS Inactivity Reboot 38C3 Lightningtalks
When your phone is stolen, a simple reboot significantly improves the security of your data! Curious about how this protection works and how Apple automated reboots in iOS 18?
cfp.cccv.de
December 27, 2024 at 9:24 PM
r2con2024 videos and slides are here: radare.org/con/2024/
radare.org
November 17, 2024 at 3:38 PM
Reposted by Chai
Bluehat talks are up www.youtube.com/playlist?lis...
November 11, 2024 at 8:24 PM