#binaryanalysis 搜尋結果

I often tell people IDA is like a turbocharged Notepad++ for binaries, and I reach for its type libraries whenever a blob of assembly needs context. reverselabs.dev/blog/ida-type-… #ReverseEngineering #IDAPro #BinaryAnalysis #TypeLibraries

carlosadrianosj's tweet image. I often tell people IDA is like a turbocharged Notepad++ for binaries, and I reach for its type libraries whenever a blob of assembly needs context.
 reverselabs.dev/blog/ida-type-…
#ReverseEngineering #IDAPro #BinaryAnalysis #TypeLibraries

🖥️ Fake Binary Bypass — START! Static Linux binary loaded. Mission: bypass restrictions, peek at hidden functions & variables, and uncover the real flag 🏴‍☠️ 900 pts, reverse-engineering in action ⚡ Target: echoctf.red/challenge/6 #CTF #HackerLife #BinaryAnalysis #EchoCTF


🖥️ Fake Binary Bypass — DONE! Bypassed a static Linux binary, inspected hidden functions, and peeked at internal variables 🏴‍☠️ 900 pts, reverse-engineering flexed ⚡ Target: echoctf.red/challenge/6 #CTF #HackerLife #BinaryAnalysis #EchoCTF


Fuzzable - Framework For Automating Fuzzable Target Discovery With Static Analysis bit.ly/3XB97Zf #BinaryAnalysis #Fuzzable

KitPloit's tweet image. Fuzzable - Framework For Automating Fuzzable Target Discovery With Static Analysis bit.ly/3XB97Zf #BinaryAnalysis #Fuzzable

Introducing Nova, a series of foundation models for binary/assembly code. We have also released fine-tuned models for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.

Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.
Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.
Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.

This room has stuffed ton of things into my mind, Perhaps, I should take a breath and revisit it! #reverseengineering #reversing #binaryanalysis

realperumalj's tweet image. This room has stuffed ton of things into my mind, Perhaps, I should take a breath and revisit it!

#reverseengineering #reversing #binaryanalysis

The blog post keeps going, as I said it will take some time until I finish writing it, but I think you will really like the content :D #compiler #binaryanalysis #dalvik

Farenain's tweet image. The blog post keeps going, as I said it will take some time until I finish writing it, but I think you will really like the content :D #compiler #binaryanalysis #dalvik

Why is it called “optional” if it’s required to run? 🧠 Dive into the Windows PE Optional Header with us. Full video on YouTube! 🔗 #HackDefenderAcademy #PEfile #BinaryAnalysis #module0 #class2


Securing IoT products demands deep #BinaryAnalysis. Why? Because today’s IoT software is a tangled web of global supply chains, legacy code & opaque binaries. In our Security Short, Edwin makes it clear: to protect IoT products, you have to go deeper than the surface. #IoT


Precompiled binaries are a black box risk. Without source code, you’re left with vendor docs & guesswork. In our "Security Short", Edwin stresses that the only way to truly understand what’s inside precompiled binaries is through #BinaryAnalysis. Visibility matters.


@danning_x will present our paper ReSym (Distinguished paper award) at #CCS2024! github.com/lt-asset/resym Check it out if you are around. @acm_ccs @cerias @PurdueCS #binaryanalysis #llm #llm4code

🎉 Excited to announce that our paper "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" has won the Distinguished Paper Award at #CCS2024! I'll present tomorrow afternoon in 9-4 session at @acm_ccs. Hope to see you! #LLM #LLM4Code

danning_x's tweet image. 🎉 Excited to announce that our paper "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" has won the Distinguished Paper Award at #CCS2024! I'll present tomorrow afternoon in 9-4 session at @acm_ccs. Hope to see you! #LLM #LLM4Code
danning_x's tweet image. 🎉 Excited to announce that our paper "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" has won the Distinguished Paper Award at #CCS2024! I'll present tomorrow afternoon in 9-4 session at @acm_ccs. Hope to see you! #LLM #LLM4Code


🔍How can AI unlock deeper insights into binary code? This survey decodes recent breakthroughs in semantic feature selection & embedding for binary analysis. Read more👇 academax.com/FITEE/doi/10.1… #AcadeMax #BinaryAnalysis #AI #Cybersecurity #SoftwareEngineering

Academax_J's tweet image. 🔍How can AI unlock deeper insights into binary code?
This survey decodes recent breakthroughs in semantic feature selection & embedding for binary analysis. 
Read more👇 academax.com/FITEE/doi/10.1…

#AcadeMax  #BinaryAnalysis #AI #Cybersecurity #SoftwareEngineering

Fuzzable - Framework For Automating Fuzzable Target Discovery With Static Analysis bit.ly/3XB97Zf #BinaryAnalysis #Fuzzable

NaderZaveri's tweet image. Fuzzable - Framework For Automating Fuzzable Target Discovery With Static Analysis bit.ly/3XB97Zf #BinaryAnalysis #Fuzzable

What happens at the 𝙚𝙣𝙩𝙧𝙮 𝙥𝙤𝙞𝙣𝙩 stays at the 𝙚𝙣𝙩𝙧𝙮 𝙥𝙤𝙞𝙣𝙩... unless you analyze it 😉 🔗 academy.hack-defender.com 🔗𝙔𝙤𝙪𝙏𝙪𝙗𝙚 @hackder_official #ReverseEngineering #BinaryAnalysis #HackDefenderAcademy #TechTok #CyberTips #module0 #class2 #ida #infosec


radare2 – Reverse engineering framework rivaling IDA. 🌐 rada.re/n/ #RETools #BinaryAnalysis


🛠️ The Dump: The Dump window in OllyDbg is a built-in hex viewer displaying raw binary data in memory. It typically shows two views: hexadecimal and ASCII, allowing you to inspect the binary directly. #BinaryAnalysis #OllyDbg


🔍 Master binary analysis with 010 Editor! Learn hex searches, binary templates, & PE file analysis with hands-on labs. 💸 Pay what you can & start today! 👉 labs.cyber5w.com/courses/5dd828… #DFIR #BinaryAnalysis #DigitalForensics #010Editor #CyberSecurity #C5W

cyber5w's tweet image. 🔍 Master binary analysis with 010 Editor!
Learn hex searches, binary templates, & PE file analysis with hands-on labs.

💸 Pay what you can & start today!
👉 labs.cyber5w.com/courses/5dd828…

#DFIR #BinaryAnalysis #DigitalForensics #010Editor #CyberSecurity #C5W

Angr Founder: Luis Moreira & the Angr Team Binary analysis framework with symbolic execution, enabling deep vulnerability discovery & exploit development. angr.io #BinaryAnalysis #SymbolicExecution


I often tell people IDA is like a turbocharged Notepad++ for binaries, and I reach for its type libraries whenever a blob of assembly needs context. reverselabs.dev/blog/ida-type-… #ReverseEngineering #IDAPro #BinaryAnalysis #TypeLibraries

carlosadrianosj's tweet image. I often tell people IDA is like a turbocharged Notepad++ for binaries, and I reach for its type libraries whenever a blob of assembly needs context.
 reverselabs.dev/blog/ida-type-…
#ReverseEngineering #IDAPro #BinaryAnalysis #TypeLibraries

Hi! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 12 August 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 12 August 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hi! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 12 August 2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 12 August 2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hi! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hi! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


🚀 Just launched ShadowSeek at Black Hat Arsenal 2025! This new AI-powered binary security analysis platform is set to change how we find vulnerabilities in closed-source code. Try here: github.com/threatpointer/… #BinaryAnalysis #ReverseEngineering #LLM #Ghidra #SecurityResearch


Hi! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Angr - A Powerful And User-Friendly Binary Analysis Platform j.mp/2UgfvVq #Angr #BinaryAnalysis #CTF #Python #SymbolicExecution

KitPloit's tweet image. Angr - A Powerful And User-Friendly Binary Analysis Platform j.mp/2UgfvVq #Angr #BinaryAnalysis #CTF #Python #SymbolicExecution

Radare2 - UNIX-like Reverse Engineering Framework And Command-Line Toolset j.mp/3rO0vzN #BinaryAnalysis #Forensics

KitPloit's tweet image. Radare2 - UNIX-like Reverse Engineering Framework And Command-Line Toolset j.mp/3rO0vzN #BinaryAnalysis #Forensics

Detect It Easy - Program For Determining Types Of Files For Windows, Linux And MacOS j.mp/2YeTkUZ #BinaryAnalysis #Debugger #Mac

KitPloit's tweet image. Detect It Easy - Program For Determining Types Of Files For Windows, Linux And MacOS j.mp/2YeTkUZ #BinaryAnalysis #Debugger #Mac

IDA Free has been upgraded to the latest IDA version 7.7SP1! This light but powerful tool can quickly analyze the binary code samples and allow users to take a closer look at the results. Try it out for free hex-rays.com/ida-free/ #IDAFreeware #Binaryanalysis #HexRays

HexRaysSA's tweet image. IDA Free has been upgraded to the latest IDA version 7.7SP1! 
This light but powerful tool can quickly analyze the binary code samples and allow users to take a closer look at the results. 
Try it out for free hex-rays.com/ida-free/

#IDAFreeware #Binaryanalysis #HexRays

Introducing Nova, a series of foundation models for binary/assembly code. We have also released fine-tuned models for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.

Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.
Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.
Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.

DrSemu - Malware Detection And Classification Tool Based On Dynamic Behavior j.mp/2V3rVDv #BinaryAnalysis #DetectMalware #DrSemu

KitPloit's tweet image. DrSemu - Malware Detection And Classification Tool Based On Dynamic Behavior j.mp/2V3rVDv #BinaryAnalysis #DetectMalware #DrSemu

Sploit - Go Package That Aids In Binary Analysis And Exploitation j.mp/3hezoZf #Assembler #BinaryAnalysis #CTF #Leak #Linux

KitPloit's tweet image. Sploit - Go Package That Aids In Binary Analysis And Exploitation j.mp/3hezoZf #Assembler #BinaryAnalysis #CTF #Leak #Linux

Manticore - Symbolic Execution Tool For Analysis Of Binaries And Smart Contracts j.mp/2A0zheG #BinaryAnalysis #Blockchain #Linux

KitPloit's tweet image. Manticore - Symbolic Execution Tool For Analysis Of Binaries And Smart Contracts j.mp/2A0zheG #BinaryAnalysis #Blockchain #Linux

Loading...

Something went wrong.


Something went wrong.


United States Trends