36 Followers
15 Following
65 Posts
Working at the intersection of security & code @circl / @0xrawsec. Aiming for a better, more open tech world. Developing in #rustlang, #golang and #python. Author of @kunai_project and several others.
GitHubhttps://github.com/qjerome

βš™οΈ Technical Spotlight: New Session at BSides Luxembourg 2026

π—žπ—¨π—‘π—”π—œ: π—’π—£π—˜π—‘-𝗦𝗒𝗨π—₯π—–π—˜ 𝗧𝗛π—₯π—˜π—”π—§ π——π—˜π—§π—˜π—–π—§π—œπ—’π—‘ 𝗒𝗑 π—Ÿπ—œπ—‘π—¨π—« – Quentin JEROME

Step into a practical 40-minute talk exploring how modern threat detection is evolving on Linux systems. This session introduces Kunai, an open-source tool built with eBPF to bring deep visibility, real-time monitoring, and Sysmon-like capabilities to Linux environmentsβ€”where traditional security tooling often falls short.

From architecture to real-world use cases, discover how Kunai enables incident responders and defenders to detect threats, investigate events, and enhance forensic analysis across cloud and containerized systems. A must-attend for anyone working with Linux infrastructure and looking to strengthen detection and response capabilities.

Quentin Jerome is a Rust developer at CIRCL, focused on building open-source security tools driven by real-world incident response and threat detection needs. His work centers on improving visibility and empowering the security community.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule: https://hackertracker.app/schedule?conf=BSIDESLUX2026

#BSidesLuxembourg2026 #ThreatDetection #LinuxSecurity #DFIR #CyberSecurity #OpenSource

Security Intelligence Repository with RULEZET

Building a Trusted Community for Detection Rules

First workshop presented at @firstdotorg CTI 2026 in Munich

πŸ”— PDF https://github.com/rulezet/rulezet-workshop/raw/refs/heads/main/events/first-cti-2026/presentation.pdf

πŸ”— source code https://github.com/rulezet/

πŸ”— online version https://rulezet.org/

#rulezet #cti #threatintelligence #threathunting #opensource #cybersecurity

@circl
@misp

⚑⚑⚑ Lightning Talk Announcement! ⚑⚑⚑

✨ π— π—”π—šπ—œπ—–-π—₯𝗦: 𝗔 π— π—˜π— π—’π—₯𝗬-π—¦π—”π—™π—˜, π—Ÿπ—œπ—•π— π—”π—šπ—œπ—–-π—–π—’π— π—£π—”π—§π—œπ—•π—Ÿπ—˜ π—™π—œπ—Ÿπ—˜ π—§π—¬π—£π—˜ π——π—˜π—§π—˜π—–π—§π—œπ—’π—‘ π—˜π—–π—’π—¦π—¬π—¦π—§π—˜π—  - Quentin Jerome 🧩 (@qjerome)

File type detection just got a memory-safe upgrade β€” in Rust. In this talk, Quentin Jerome shows how Magic-rs brings libmagic’s power to modern, safe code β€” with Python bindings, a CLI tool called wiza, and real-world compatibility.

Quentin Jerome https://www.linkedin.com/in/quentin-jerome-00a8a074 is a Rust developer at CIRCL. Inspired by his background in incident response and threat detection, he builds open-source security tools to solve practical problems. His main interests include threat detection, bug hunting, and building tools that help the security community.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #Rust #FileDetection #MemorySafety #OpenSource #CyberSecurity

πŸͺ² Bug Fix in pure-magic!

I just fixed a tricky offset computation bug in pure-magic, your pure Rust port of libmagic for safe file identification. So, make sure you are using the latest version available for your toolings.

πŸ”Ž Check it out

- Rust Crate: https://crates.io/crates/pure-magic
- CLI Tool (replaces file): cargo install wiza
- Python Bindings: https://pypi.org/project/pure-magic-rs/
- Repository: https://github.com/qjerome/magic-rs

#Rust #FileIdentification #OpenSource #Python

crates.io: Rust Package Registry

crates.io serves as a central registry for sharing crates, which are packages or libraries written in Rust that you can use to enhance your projects

Rust 1.94.0 has been released! 🌈 πŸ¦€ ✨

A few highlights are array_windows() and element_offset() on slices, Peekable::next_if_map(), LazyCell::get and friends, and the new `include` key in config.toml to include other toml files!

Check out the blog post for details: https://blog.rust-lang.org/2026/03/05/Rust-1.94.0/

Announcing Rust 1.94.0 | Rust Blog

Empowering everyone to build reliable and efficient software.

Call for papers is now open for hack.lu 2026 (the 20th edition!)

The purpose of the hack.lu convention is to provide an open and free playground where people can discuss the implications of new technologies in society. hack.lu is a balanced mix convention where technical and non-technical people can meet and share all kinds of information freely. The convention will be held in the Grand-Duchy of Luxembourg in October (20-23.10.2026). The most significant new discoveries about computer network attacks and defenses, open-source security solutions, and pragmatic real-world security experiences will be presented in a four-day series of informative tutorials.

We are waiting for your great proposals!

https://2026.hack.lu/blog/hack.lu-2026-call-for-papers/

#cfp #luxembourg #conference #cybersecurity #callforpapers #hacklu

Call for papers is now open for hack.lu 2026 (the 20th edition!)

Time to submit a talk, training or workshop to hack.lu

hack.lu 2026

After months of quiet, Kunai is back with an update in the works!

Here’s what’s new:

- Sharper DNS traffic analysis for better threat detection

- File identification powered by magic-rs to unlock deeper detection scenarios

- Smarter event filtering and exclusion rules to cut false positives and boost performance

This release will be about making Kunai more precise, faster, and easier to useβ€”whether you’re monitoring workstations, servers, or IoT devices.

If you have specific a request, this is the perfect time to open an issue and get a chance to see it land in the next release πŸ˜‰

Curious? Follow the progress here: https://github.com/kunai-project

#Linux #ThreatHunting #Rust #eBPF #OpenSource

For a quick test of #dioxus I implemented a web interface for #faup-rs, you can see the demo website (all running locally in webasm) https://faup.claudex.be/

cc @qjerome

https://codeberg.org/claudex/faup-rs

#rust #faup-web

faup-web

I’ll be at @fosdem next Saturday and Sunday. If you’d like to chat, feel free to find me to talk about:

  • MISP
  • Open Source Software and Security
  • GCVE.eu / Vulnerability-Lookup
  • AIL Project and one of the many @circl open source projects
  • or anything else ;-)

#fosdem #infosec #cybersecurity #opensource #gvip

I’ll also be in Brussels on Wednesday for the GVIP Summit 01 too.

The last 5 days have been a bit wild for the GCVE.eu initiative.

What started as steady work suddenly picked up real momentum:

  • The public GCVE.eu database instance - https://db.gcve.eu/ - caught the attention of the media, sparking discussions well beyond our usual circles

  • We published updates to the GCVE KEV Assertion Standard Format (BCP-07), refining how known-exploited information can be asserted and shared

  • Vulnerability-Lookup 2.21.0 was released, bringing improvements aligned with the GCVE ecosystem

  • We received a lot of valuable feedback especially on the specs, the tooling, and the overall direction

  • New GNAs joined the GCVE directory, and new contributors stepped in to help shape both the specifications and the software

Seeing this level of engagement, critique, and contribution in such a short time is incredibly motivating. It reinforces why an open, decentralized, and collaborative approach to vulnerability identification and sharing matters.

Huge thanks to everyone who tested, commented, challenged assumptions, wrote code, improved text, or simply helped spread the word. This is very much a community effort and it’s only getting started. πŸ’™

#GCVE #OpenSource #VulnerabilityManagement #CyberSecurity #Standards #Community

Don't hesitate to follow us at GCVE-EU - @gcve

@circl

GCVE BCP - https://gcve.eu/bcp/
GCVE DB - https://db.gcve.eu/recent
Vulnerability-Lookup - https://github.com/vulnerability-lookup/vulnerability-lookup

Vulnerability-Lookup

Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.