ReverseThatApp's profile picture.  Developer/Develop tweak and patch iOS binary/ Reverse Engineering iOS apps (arm, arm64)/ Learning kernel!!

ReverseThatApp

@ReverseThatApp

 Developer/Develop tweak and patch iOS binary/ Reverse Engineering iOS apps (arm, arm64)/ Learning kernel!!

Really enjoyed #flareon12 — especially challenges 7, 8, and the brutal but fun final challenge (9). 🧠🔥 Thanks to @Mandiant for another amazing RE CTF. #CTF #ReverseEngineering #CyberSecurity

ReverseThatApp's tweet image. Really enjoyed #flareon12 — especially challenges 7, 8, and the brutal but fun final challenge (9). 🧠🔥
Thanks to @Mandiant for another amazing RE CTF.

 #CTF #ReverseEngineering #CyberSecurity

ReverseThatApp gönderiyi yeniden yayınladı

We present appledb_rs, an open-source tool to analyze Apple IPSWs without storing full images. Extraction, indexing, API, and web interface to speed up your security research 🔍 🔗 Full article available here: synacktiv.com/en/publication… 📂 Source code: github.com/synacktiv/appl…

github.com

GitHub - synacktiv/appledb_rs: Apple artifacts database - Mirror of https://github.com/cocool97/a...

Apple artifacts database - Mirror of https://github.com/cocool97/appledb_rs - synacktiv/appledb_rs


ReverseThatApp gönderiyi yeniden yayınladı

Devirtualizing VMProtect and Themida nac-l.github.io/2025/01/25/lif… #infosec #reverseengineering

0xor0ne's tweet image. Devirtualizing VMProtect and Themida

nac-l.github.io/2025/01/25/lif…

#infosec #reverseengineering

ReverseThatApp gönderiyi yeniden yayınladı

#flareon12 pre-register now at flare-on12.ctfd.io The puzzles are unleashed tomorrow.


ReverseThatApp gönderiyi yeniden yayınladı

Community Write-Ups from 8kSec Mobile Security Battlegrounds Our free Mobile Security Labs have inspired some excellent technical deep dives. Below is a running list of community write-ups that detail their techniques, tooling, and exploitation steps. 🤖Android Labs @f0rk3b0mb

8kSec's tweet image. Community Write-Ups from 8kSec Mobile Security Battlegrounds
Our free Mobile Security Labs have inspired some excellent technical deep dives. Below is a running list of community write-ups that detail their techniques, tooling, and exploitation steps.

🤖Android Labs

@f0rk3b0mb…
8kSec's tweet image. Community Write-Ups from 8kSec Mobile Security Battlegrounds
Our free Mobile Security Labs have inspired some excellent technical deep dives. Below is a running list of community write-ups that detail their techniques, tooling, and exploitation steps.

🤖Android Labs

@f0rk3b0mb…
8kSec's tweet image. Community Write-Ups from 8kSec Mobile Security Battlegrounds
Our free Mobile Security Labs have inspired some excellent technical deep dives. Below is a running list of community write-ups that detail their techniques, tooling, and exploitation steps.

🤖Android Labs

@f0rk3b0mb…

ReverseThatApp gönderiyi yeniden yayınladı

FLARE-On 12 is about to blow up your weekends: security.googlecloudcommunity.com/news-announcem… #flareon12


ReverseThatApp gönderiyi yeniden yayınladı

The 12th Annual Flare-On Challenge kicks off Sept 26 at 8PM EST! Reverse engineering pros, from Windows to Web3 (with a YARA twist), it's your time to shine. 🏆 Get ready → bit.ly/4ofb5g8 #FlareOn12

Mandiant's tweet image. The 12th Annual Flare-On Challenge kicks off Sept 26 at 8PM EST!

Reverse engineering pros, from Windows to Web3 (with a YARA twist), it's your time to shine. 🏆

Get ready → bit.ly/4ofb5g8

#FlareOn12

ReverseThatApp gönderiyi yeniden yayınladı

zero‑click iMessage exploit? 🕵️‍♂️ I diffed iOS 18.3 vs 18.3.1, uncovered the logic flaw and dropped RE walkthrough and forensic tips so you can trace it too. jaybird1291.github.io/blog-cyber/en/…

minacrissDev_'s tweet image. zero‑click iMessage exploit? 🕵️‍♂️ 

I diffed iOS 18.3 vs 18.3.1, uncovered the logic flaw and dropped RE walkthrough and forensic tips so you can trace it too.

jaybird1291.github.io/blog-cyber/en/…
minacrissDev_'s tweet image. zero‑click iMessage exploit? 🕵️‍♂️ 

I diffed iOS 18.3 vs 18.3.1, uncovered the logic flaw and dropped RE walkthrough and forensic tips so you can trace it too.

jaybird1291.github.io/blog-cyber/en/…

ReverseThatApp gönderiyi yeniden yayınladı

Thanks to a lot of work put in by @mrexodia, IDACode has finally gotten an official update again after 3 years of inactivity! It features stability improvements as well as IDA 9 compatibility improvements! Thanks a lot to everyone involved <3 github.com/ioncodes/idaco…

github.com

GitHub - ioncodes/idacode: An integration for IDA and VS Code which connects both to easily execute...

An integration for IDA and VS Code which connects both to easily execute and debug IDAPython scripts. - ioncodes/idacode


ReverseThatApp gönderiyi yeniden yayınladı

Just released a short writeup for the A9 version of the Trigon exploit, which involves getting code execution on a coprocessor before exploiting the kernel - enjoy! alfiecg.uk/2025/07/16/Tri…


ReverseThatApp gönderiyi yeniden yayınladı

🤩 GuidedHacking's Anti-Cheat Development Course 🚀 COMING SOON!!

GuidedHacking's tweet image. 🤩 GuidedHacking&apos;s Anti-Cheat Development Course

🚀 COMING SOON!!

ReverseThatApp gönderiyi yeniden yayınladı

Unrestrict the restricted mode for USB on iPhone. A first analysis @citizenlab #CVE-2025-24200 👉 blog.quarkslab.com/first-analysis…

quarkslab's tweet image. Unrestrict the restricted mode for USB on iPhone. A first analysis @citizenlab #CVE-2025-24200 👉 blog.quarkslab.com/first-analysis…

ReverseThatApp gönderiyi yeniden yayınladı

macOS Malware Development (Part 2) : 0x00sec.org/t/macos-malwar… Part 1 : 0x00sec.org/t/macos-malwar… Executing Mach-Os In-Memory : 0x00sec.org/t/executing-ma… Ref : Inside a Hello World executable on OS X : adrummond.net/posts/macho The Mystery of Mach-O Object Structure :…


ReverseThatApp gönderiyi yeniden yayınladı

Using LLMs to play Flare-On 11. Much more fun compared to pre-LLMs era. youtu.be/w232BOBfoeA

expend20's tweet card. Flare-On 11 -vs- LLMs (1-5 solutions)

youtube.com

YouTube

Flare-On 11 -vs- LLMs (1-5 solutions)


ReverseThatApp gönderiyi yeniden yayınladı

Trigon: developing a deterministic kernel exploit for iOS alfiecg.uk/2025/03/01/Tri…


ReverseThatApp gönderiyi yeniden yayınladı

Here we can see @AnthropicAI's claude (Sonnet 3.7 model) talking to IDA pro to reverse engineer a CTF task I made for @PotluckCTF, it does pretty well! It manages to get a grasp of the entire custom VM instruction set, file format, syscall interface etc.🤓 The MCP server is…


ReverseThatApp gönderiyi yeniden yayınladı

Introdution for beginners to embedded devices reverse engineering Ghidra setup: voidstarsec.com/blog/ghidra-de… Tools: voidstarsec.com/blog/intro-to-… Firmware extraction: voidstarsec.com/blog/uart-uboo… Credits @voidstarsec #cybersecurity

0xor0ne's tweet image. Introdution for beginners to embedded devices reverse engineering

Ghidra setup: voidstarsec.com/blog/ghidra-de… 
Tools: voidstarsec.com/blog/intro-to-… 
Firmware extraction: voidstarsec.com/blog/uart-uboo… 

Credits @voidstarsec

#cybersecurity

ReverseThatApp gönderiyi yeniden yayınladı

Lifting Binaries, Part 0: Devirtualizing VMProtect and Themida: It's Just Flattening? by Naci nac-l.github.io/2025/01/25/lif…

alexjplaskett's tweet image. Lifting Binaries, Part 0: Devirtualizing VMProtect and Themida: It&apos;s Just Flattening? by Naci

nac-l.github.io/2025/01/25/lif…
alexjplaskett's tweet image. Lifting Binaries, Part 0: Devirtualizing VMProtect and Themida: It&apos;s Just Flattening? by Naci

nac-l.github.io/2025/01/25/lif…
alexjplaskett's tweet image. Lifting Binaries, Part 0: Devirtualizing VMProtect and Themida: It&apos;s Just Flattening? by Naci

nac-l.github.io/2025/01/25/lif…

It's an amazing journey, learned many stuffs and cant wait for the next year 😎 #flareon11

ReverseThatApp's tweet image. It&apos;s an amazing journey, learned many stuffs and cant wait for the next year 😎
#flareon11

Loading...

Something went wrong.


Something went wrong.