#binaryanalysis 搜尋結果

Introducing Nova, a series of foundation models for binary/assembly code. We have also released fine-tuned models for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.

Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.
Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.
Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.

I often tell people IDA is like a turbocharged Notepad++ for binaries, and I reach for its type libraries whenever a blob of assembly needs context. reverselabs.dev/blog/ida-type-… #ReverseEngineering #IDAPro #BinaryAnalysis #TypeLibraries

carlosadrianosj's tweet image. I often tell people IDA is like a turbocharged Notepad++ for binaries, and I reach for its type libraries whenever a blob of assembly needs context.
 reverselabs.dev/blog/ida-type-…
#ReverseEngineering #IDAPro #BinaryAnalysis #TypeLibraries

🧩 #BinaryAnalysis for legacy devices 🧩 Source code SCA for in-development products 🧩 #SBOM validation for opaque third-party components Dario Lobozzo explains why a layered, flexible analysis approach is essential for CRA compliance #ProductSecurity #IoTSecurity


Fourth in the session was Fan et al.'s "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries," exploring gaps in cryptographic tool evaluation. (acsac.org/2024/program/f…) 5/6 #Cybersecurity #BinaryAnalysis

ACSAC_Conf's tweet image. Fourth in the session was Fan et al.'s "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries," exploring gaps in cryptographic tool evaluation. (acsac.org/2024/program/f…) 5/6
#Cybersecurity #BinaryAnalysis

The blog post keeps going, as I said it will take some time until I finish writing it, but I think you will really like the content :D #compiler #binaryanalysis #dalvik

Farenain's tweet image. The blog post keeps going, as I said it will take some time until I finish writing it, but I think you will really like the content :D #compiler #binaryanalysis #dalvik

Fuzzable - Framework For Automating Fuzzable Target Discovery With Static Analysis bit.ly/3XB97Zf #BinaryAnalysis #Fuzzable

KitPloit's tweet image. Fuzzable - Framework For Automating Fuzzable Target Discovery With Static Analysis bit.ly/3XB97Zf #BinaryAnalysis #Fuzzable

This room has stuffed ton of things into my mind, Perhaps, I should take a breath and revisit it! #reverseengineering #reversing #binaryanalysis

realperumalj's tweet image. This room has stuffed ton of things into my mind, Perhaps, I should take a breath and revisit it!

#reverseengineering #reversing #binaryanalysis

Why is it called “optional” if it’s required to run? 🧠 Dive into the Windows PE Optional Header with us. Full video on YouTube! 🔗 #HackDefenderAcademy #PEfile #BinaryAnalysis #module0 #class2


Securing IoT products demands deep #BinaryAnalysis. Why? Because today’s IoT software is a tangled web of global supply chains, legacy code & opaque binaries. In our Security Short, Edwin makes it clear: to protect IoT products, you have to go deeper than the surface. #IoT


Precompiled binaries are a black box risk. Without source code, you’re left with vendor docs & guesswork. In our "Security Short", Edwin stresses that the only way to truly understand what’s inside precompiled binaries is through #BinaryAnalysis. Visibility matters.


Excited to release sharpAngr! 🚀 A .NET port of @angr_gh that brings symbolic execution & binary analysis to C# devs. Explore, exploit, reverse—now with LINQ & async. GitHub: github.com/anhed0nic/shar… #reverseengineering #binaryanalysis #dotnet #angr


Fuzzable - Framework For Automating Fuzzable Target Discovery With Static Analysis bit.ly/3XB97Zf #BinaryAnalysis #Fuzzable

NaderZaveri's tweet image. Fuzzable - Framework For Automating Fuzzable Target Discovery With Static Analysis bit.ly/3XB97Zf #BinaryAnalysis #Fuzzable

🔍How can AI unlock deeper insights into binary code? This survey decodes recent breakthroughs in semantic feature selection & embedding for binary analysis. Read more👇 academax.com/FITEE/doi/10.1… #AcadeMax #BinaryAnalysis #AI #Cybersecurity #SoftwareEngineering

Academax_J's tweet image. 🔍How can AI unlock deeper insights into binary code?
This survey decodes recent breakthroughs in semantic feature selection & embedding for binary analysis. 
Read more👇 academax.com/FITEE/doi/10.1…

#AcadeMax  #BinaryAnalysis #AI #Cybersecurity #SoftwareEngineering

angr-rs is here! A memory-safe, drop-in Rust port of the legendary angr binary analysis framework. Same power, zero segfaults. Rewrite-it-in-Rust complete. github.com/anhed0nic/angr… #rustlang #binaryanalysis #angr #riir #rewriteitinrust


🔍 Master binary analysis with 010 Editor! Learn hex searches, binary templates, & PE file analysis with hands-on labs. 💸 Pay what you can & start today! 👉 labs.cyber5w.com/courses/5dd828… #DFIR #BinaryAnalysis #DigitalForensics #010Editor #CyberSecurity #C5W

cyber5w's tweet image. 🔍 Master binary analysis with 010 Editor!
Learn hex searches, binary templates, & PE file analysis with hands-on labs.

💸 Pay what you can & start today!
👉 labs.cyber5w.com/courses/5dd828…

#DFIR #BinaryAnalysis #DigitalForensics #010Editor #CyberSecurity #C5W

What happens at the 𝙚𝙣𝙩𝙧𝙮 𝙥𝙤𝙞𝙣𝙩 stays at the 𝙚𝙣𝙩𝙧𝙮 𝙥𝙤𝙞𝙣𝙩... unless you analyze it 😉 🔗 academy.hack-defender.com 🔗𝙔𝙤𝙪𝙏𝙪𝙗𝙚 @hackder_official #ReverseEngineering #BinaryAnalysis #HackDefenderAcademy #TechTok #CyberTips #module0 #class2 #ida #infosec


🛠️ The Dump: The Dump window in OllyDbg is a built-in hex viewer displaying raw binary data in memory. It typically shows two views: hexadecimal and ASCII, allowing you to inspect the binary directly. #BinaryAnalysis #OllyDbg


radare2 – Reverse engineering framework rivaling IDA. 🌐 rada.re/n/ #RETools #BinaryAnalysis


🧩 #BinaryAnalysis for legacy devices 🧩 Source code SCA for in-development products 🧩 #SBOM validation for opaque third-party components Dario Lobozzo explains why a layered, flexible analysis approach is essential for CRA compliance #ProductSecurity #IoTSecurity


Fourth in the session was Fan et al.'s "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries," exploring gaps in cryptographic tool evaluation. (acsac.org/2024/program/f…) 5/6 #Cybersecurity #BinaryAnalysis

ACSAC_Conf's tweet image. Fourth in the session was Fan et al.'s "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries," exploring gaps in cryptographic tool evaluation. (acsac.org/2024/program/f…) 5/6
#Cybersecurity #BinaryAnalysis

I often tell people IDA is like a turbocharged Notepad++ for binaries, and I reach for its type libraries whenever a blob of assembly needs context. reverselabs.dev/blog/ida-type-… #ReverseEngineering #IDAPro #BinaryAnalysis #TypeLibraries

carlosadrianosj's tweet image. I often tell people IDA is like a turbocharged Notepad++ for binaries, and I reach for its type libraries whenever a blob of assembly needs context.
 reverselabs.dev/blog/ida-type-…
#ReverseEngineering #IDAPro #BinaryAnalysis #TypeLibraries

Hi! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 12 August 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 12 August 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hi! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 12 August 2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 12 August 2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hi! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hi! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Introducing Nova, a series of foundation models for binary/assembly code. We have also released fine-tuned models for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.

Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.
Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.
Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.

IDA Free has been upgraded to the latest IDA version 7.7SP1! This light but powerful tool can quickly analyze the binary code samples and allow users to take a closer look at the results. Try it out for free hex-rays.com/ida-free/ #IDAFreeware #Binaryanalysis #HexRays

HexRaysSA's tweet image. IDA Free has been upgraded to the latest IDA version 7.7SP1! 
This light but powerful tool can quickly analyze the binary code samples and allow users to take a closer look at the results. 
Try it out for free hex-rays.com/ida-free/

#IDAFreeware #Binaryanalysis #HexRays

Angr - A Powerful And User-Friendly Binary Analysis Platform j.mp/2UgfvVq #Angr #BinaryAnalysis #CTF #Python #SymbolicExecution

KitPloit's tweet image. Angr - A Powerful And User-Friendly Binary Analysis Platform j.mp/2UgfvVq #Angr #BinaryAnalysis #CTF #Python #SymbolicExecution

Radare2 - UNIX-like Reverse Engineering Framework And Command-Line Toolset j.mp/3rO0vzN #BinaryAnalysis #Forensics

KitPloit's tweet image. Radare2 - UNIX-like Reverse Engineering Framework And Command-Line Toolset j.mp/3rO0vzN #BinaryAnalysis #Forensics

Step by step I'm implementing the lifting from Android Dalvik Code to KUNAI IR (called MjolnIR), lifting instructions is a pain in the ass process because you must retrieve the semantic of the instruction and assign one from your IR #KUNAI #BinaryAnalysis

Farenain's tweet image. Step by step I'm implementing the lifting from Android Dalvik Code to KUNAI IR (called MjolnIR), lifting instructions is a pain in the ass process because you must retrieve the semantic of the instruction and assign one from your IR #KUNAI #BinaryAnalysis
Farenain's tweet image. Step by step I'm implementing the lifting from Android Dalvik Code to KUNAI IR (called MjolnIR), lifting instructions is a pain in the ass process because you must retrieve the semantic of the instruction and assign one from your IR #KUNAI #BinaryAnalysis

This is one of the comments from KUNAI to generate the IR CFG #Programming #cpplus #BinaryAnalysis

Farenain's tweet image. This is one of the comments from KUNAI to generate the IR CFG #Programming #cpplus #BinaryAnalysis

The rev.ng decompiler whole-program type recovery is getting closer and closer every day. Here's out first nested union (: #revng #binaryanalysis #llvm #decompiler

_revng's tweet image. The rev.ng decompiler whole-program type recovery is getting closer and closer every day. Here's out first nested union (: #revng #binaryanalysis #llvm #decompiler

Detect It Easy - Program For Determining Types Of Files For Windows, Linux And MacOS j.mp/2YeTkUZ #BinaryAnalysis #Debugger #Mac

KitPloit's tweet image. Detect It Easy - Program For Determining Types Of Files For Windows, Linux And MacOS j.mp/2YeTkUZ #BinaryAnalysis #Debugger #Mac

Manticore - Symbolic Execution Tool For Analysis Of Binaries And Smart Contracts j.mp/2A0zheG #BinaryAnalysis #Blockchain #Linux

KitPloit's tweet image. Manticore - Symbolic Execution Tool For Analysis Of Binaries And Smart Contracts j.mp/2A0zheG #BinaryAnalysis #Blockchain #Linux

Loading...

Something went wrong.


Something went wrong.


United States Trends