lukas seidel
@pr0me
Firmware Security • Embedded Systems • AI x Infosec • Researcher @binarly_io • PhD Candidate @TUBerlin • Capturing Flags for @ENOFLAG
Our work on exploring new ways for efficient firmware fuzzing will be published at @USENIXSecurity 2023! With SAFIREFUZZ, we introduce near-native rehosting, drastically improving the performance of fuzzing embedded targets. Super happy about this work w @domenuk @nSinusR

We released new Pwndbg: github.com/pwndbg/pwndbg/… ! It brings new kernel commands for dumping heap allocator info, display of not taken branches (X marker) in disasm, better disasm for ARM/MIPS/LoongArch64, initial s390x support & more! Sponsor us at github.com/sponsors/pwndbg !
We’re pumped to have @binarly_io back as our top-tier Diamond sponsor for RE//verse 2026! Round 1 conference tickets are almost sold out and prices are going up soon... be sure to grab yours now while the lowest rate is still live: re-verse.io
acquired some merch at the @PrimeIntellect meetup. was super cool to talk to so many people in the ai space and am stoked to see @willccbb's vision come true: a future of smaller but highly optimized domain-specific agents


12 years to publish and address a remote ~takeover vuln on passenger trains! crazy stuff
Turns out you can just hack any train in the USA and take control over the brakes. This is CVE-2025-1727 and it took me 12 years to get this published. This vulnerability is still not patched. Here's the story:
The way we are currently evaluating LLMs for vulnerability detection might be flawed! New paper w/ @mboehme_ . Paper: arxiv.org/abs/2408.12986 Code: github.com/niklasrisse/To… (1/10)
in case you missed the newest secure boot bypass 👀
🚨Binarly is documenting the discovery of CVE-2025-3052, a memory-corruption flaw in a Microsoft-signed UEFI module that lets attackers bypass Secure Boot and run unsigned code before the OS starts. 🔗 Full details: binarly.io/blog/another-c… 🛡️ Advisory: binarly.io/advisories/brl…
new idalib release! for folks interested in writing headless analysis scripts for IDA in rust, I can recommend @0xdea's blog post with some neat example use cases: security.humanativaspa.it/streamlining-v…
We're are happy to announce a new release of our #Rust bindings for @HexRaysSA idalib. What's new: - New APIs for working with IDBs, segments, and more - Rust 2024 support - New homepage: idalib.rs H/T to our contributors @yeggorv & @0xdea github.com/binarly-io/ida…