Blog

Recover lost files with PhotoRec

Forensics

PhotoRec is file data recovery software designed to recover lost files from hard disks, solid state drives, CD-ROMs and digital camera memory.

Read
Cylab Cybersecurity Challenges

News

Like previous years, we will be organizing coaching sessions to prepare students for the Cyber Security Challenge Belgium and other CTF competitions.

Read
Getting Started with EVE-NG

Virtualization

EVE-NG is a network emulation tool that allow network engineers and IT professionals to design, simulate and test complex network environments. It supports images from multiple vendors ( OS, Network devices, Firewalls, Servers, vPCs ...). It can handle large network topologies and it offers a user-friendly interface accessible via any web browser which is user-friendly.

Read
Run a local instance of Stable Diffusion and use AI to generate images

AI

Next to ChatGPT, the apparition of image generation AI was a real breakthrough. These algorithms are able to create stunning and detailed images from textual descriptions. In this field, Stable Diffusion stands out by the quality of the images, but also by its open and accessible nature. Unlike many proprietary AI tools, Stable Diffusion makes its source code and models freely available.

Read
CYLAB at the ARES conference 2024

AI Cyber Situation Awareness Conference

Members of the Cyber Defence Lab attended this year's edition of the "International Conference on Availability, Reliability and Security ARES 2024" that was held in Vienna, Austria. They presented two papers in the field of AI and Cyber Situation Awareness.

Read
AI powered knowledge exploration with Globe Explorer

AI Teaching

Next to the very popular ChatGPT, a lot of other AI powered applications have sparked on the web recently. Globe Explorer https://explorer.globe.engineer/ is one of these, specially developed to explore knowledge and discover new domains.

Read
Install Eric Zimmerman's forensics tools on Linux

Forensics Linux

In a previous blog post, I presented the forensics tools written by Eric Zimmerman. Although these tools were originally developed for Windows, you can also run them on a Linux. This allows to run a full forensic investigation using a Linux computer.

Read
[geth] Developer mode

Blockchain Ethereum

If you have already played with geth, you probably have already noticed the --dev option. This option is very handy when you want to quickly start a node to test something. However, you might have found that the developer account which is automatically set is a random account. This randomness can be annoying when trying to automate some testing tasks. The good news is that there is a way to set this developer account. That's what will be explained in this small blog post.

Read
JavaScript linting with ESLint

JavaScript

JavaScript has become the real backbone of modern web development. As of 2023, JavaScript continues to dominate as the most popular programming language, with over 65% of developers using it regularly, according to the Stack Overflow Developer Survey.

Read
A Practical Introduction to eBPF

Linux Sysadmin

Have you ever wanted to enhance your favorite distribution kernel with debugging, tracing, networking, security or plenty of other features without going through a long approval/testing/integration process managed by the Linux community? The extended Berkeley Package Filter (eBPF) is a Linux kernel feature that aims at running user-space code (eBPF programs) in the kernel, safely and efficiently, via the in-kernel eBPF machine. Let's discover how to build such programs.

Read
Performance of virtual storage (part 2) : QEMU

Virtualization Linux Sysadmin

In a previous blog post, I evaluated the performance penalty of virtual storage. I compared different host filesystems and different hypervisors (including QEMU). The conclusion was pretty harsh: in all tested configurations, virtual disks are almost 10 times slower than host drives. In this blog post, I will test additional QEMU configuration options, to see if I can get better results...

Read
Webinar RMA

Blockchain APT Detection

A few weeks ago, we had the opportunity to present a short webinar on two topics currently under research in our department:

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept