Alex Matrosov's Avatar

Alex Matrosov

@matrosov

250
Followers
105
Following
2
Posts
26.08.2023
Joined
Posts Following

Latest posts by Alex Matrosov @matrosov

Preview
VulHunt Vulnerability Detection Framework by Binarly's REsearch Team

We @binarly.bsky.social just open-sourced our VulHunt framework at RE//verse!

GitHub: github.com/vulhunt-re/v...
Documentation: vulhunt.re/docs
Slack: join.slack.com/t/vulhunt/sh...

vulhunt.re

07.03.2026 23:22 👍 11 🔁 6 💬 1 📌 0

Thanks for shout out!

01.03.2026 01:31 👍 1 🔁 0 💬 0 📌 0
Preview
sbom-tools — From SBOM to Insight Semantic SBOM diff and analysis tool. Compare, validate, and assess the quality of SBOMs across CycloneDX and SPDX formats.

Binarly's Alex Matrosov has launched SBOM Tools, a platform to compare and analyze SBOM files to understand software supply chain risks

sbom.tools

01.03.2026 01:07 👍 17 🔁 9 💬 1 📌 0

It's awesome to see companies like @binarly.bsky.social helping support OST2 so it can keep bringing free training to the world! (This could/should be your company too! :))

03.11.2025 11:59 👍 3 🔁 2 💬 0 📌 0
Post image

This research demonstrates how easily full persistence can be achieved on Supermicro BMC, allowing complete takeover of the server.

- CVE-2025-7937: bypassed “fix” for CVE-2024-10237.
- CVE-2025-6198: Supermicro RoT bypass.

www.binarly.io/blog/broken-...

24.09.2025 21:23 👍 2 🔁 2 💬 1 📌 0
Preview
Another Crack in the Chain of Trust: Uncovering (Yet Another) Secure Boot Bypass Comments

Another Crack in the Chain of Trust: Uncovering (Yet Another) #SecureBoot Bypass

https://www.binarly.io/blog/another-crack-in-the-chain-of-trust

11.06.2025 05:12 👍 2 🔁 3 💬 0 📌 0
Hydroph0bia (CVE-2025-4275) - a trivial SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O, part 1

#Hydroph0bia (CVE-2025-4275) - a trivial #SecureBoot bypass for UEFI-compatible firmware based on Insyde #H2O, part 1

https://coderush.me/hydroph0bia-part1/

11.06.2025 05:53 👍 1 🔁 5 💬 0 📌 0
Preview
GitHub - binarly-io/idalib: Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib - binarly-io/idalib

We're are happy to announce a new release of our #Rust bindings for idalib.

What's new:
- New APIs for working with IDBs, segments, and more
- Rust 2024 support
- New homepage: idalib.rs

H/T to our contributors @yeggor.bsky.social & @raptor.infosec.exchange.ap.brid.gy

github.com/binarly-io/i...

21.05.2025 22:28 👍 5 🔁 9 💬 0 📌 0
Post image

Listening to @matrosov.bsky.social and @pagabuc.bsky.social at #RSAC

29.04.2025 17:28 👍 10 🔁 1 💬 0 📌 0
Video thumbnail

In case you missed it from #LABScon24: BINARLY’s @matrosov.bsky.social and @pagabuc.bsky.social reveal their research into a firmware supply-chain security issue that affected major device vendors and hundreds of models, PKfail.

📺 Watch the full video: s1.ai/PKfail

13.12.2024 21:48 👍 8 🔁 3 💬 1 📌 0